Sistema

Wed
22
Jul

Common Virus Removal 2015

Contributed by yours truly, Charles Hornat. Please be kind, I haven't written a white paper in years.

Often times I am asked, what’s the best way to remove infections from a computer? How do I know if I am infected? Or other questions along this topic. This paper covers some things to consider, as well as areas to look at on your computer, and tactics in which to remove possible infections. This paper is geared towards windows 7 and windows 8.

This document is in PDF format. To view it click here.

Mon
20
Jul

Cloud Computing: The Future is Containers

Contributed by Larry Gene Hastings Jr.

Wed
15
Jul

Salted hashes demystified

Contributed by Andres Andreu in 2005. Restored from the old Infosecwriters.com site.

This primer will provide a basic level explanation of how seeded (or salted) hashes of clear text data are structured / created. The original formalization of this concept comes from RFC-31121. This document is written so that an understanding of this type of functionality becomes possible to anyone with a good computer science foundation. For the purposes of this exploratory journey we will use the Secure Hash Algorithm (SHA-1) hashing algorithm (NIST FIPS 180-22, RFC-31743). The salting concepts apply to any one-way hashing algorithm including the MD-5 algorithm (RFC-13214).

This document is in PDF format. To view it click here.

Wed
08
Jul

Beginners Guide to Securing IPv6

Contributed by Dustin Stocks.

Internet Protocol version six (IPv6) is already running on most networks by default. The debate of whether or not IPv6 is going to stay around or not is over. Full implementation of native IPv6 networks may be very far in the future, or never; but IPv6 traffic is routing in, out, or to your network. This internet protocol has been around since the early 1990’s. Governments, large corporations, and industry leaders are implementing it globally. Information Security (InfoSec) analysts and managers must be pro-active in pursuing education and training on IPv6. Online learning resources are increasingly available. Along with improving expertise, InfoSec professionals must improve network visibility for IPv6 traffic. Using Network Intrusion Detection Systems (NIDS) and honeypots can help identify potential threats and reduce network impact. InfoSec professionals have the ability to mitigate network risks, after improving expertise and visibility.

Wed
01
Jul

The creation, processing, distribution, and management of Intrusion Detection/Prevention System rulesets

Contributed by Mike Richter.

Pages

Subscribe to RSS - Sistema