Securewatch  
:: Accueil  :: Contact  :: Forums  :: Liens Web  :: Téléchargements  ::
Recherches


 
Modules
· Accueil
· Articles / Archives
· Articles / Soumettre
· Articles / Sujets
· Avant Première
· Contact
· Encyclopédie
· FAQ
· Forums
· Journal
· Liens Web
· Messages Privés
· MyHeadlines
· Pages Libres
· Recherches
· Recommandez nous
· Sections
· Sondages
· Statistiques
· Téléchargements
· Top 10
· Top Users
· Votre Compte
 
Derniers articles
· Différence entre SSH et SSL[ 6 commentaires - 2851 lectures ]
· Disaster recovery success begins and ends with the basics[ 13 commentaires - 2137 lectures ]
· session hijacking[ 15 commentaires - 2024 lectures ]
· Using iptables to rate-limit incoming connections[ 16 commentaires - 2267 lectures ]
· Best practices for pen testing Web applications[ 9 commentaires - 2213 lectures ]

[ + dans la sections NEWS ]
 
Articles au Hazard

Messagerie
[ Messagerie ]

·Tracing Emails
· A nouveaux virus, nouvelles techniques d'élimination
·Hooked: Phishing is luring more and more of your customers
·Lire des En-têtes de Courrier Electronique
·Le greylisting
·Installer une passerelle filtrante antivirus et antispam
 
Utilisateurs
Surnom/Pseudo

Mot de Passe

Vous n'avez pas encore de compte?
Enregistrez vous !
En tant que membre enregistré, vous bénéficierez de privilèges tels que: changer le thème de l'interface, modifier la disposition des commentaires, signer vos interventions, ...
 
Forum

 Les firewalls , passé,présent et futur

Securewatch Forums

 
 Disaster recovery success begins and ends with the basics
TheorieDennis C. Brewer
05.23.2006
Rating: -4.60- (out of 5)

The lessons from the catastrophe of 9/11 are all too often replayed with every new calamity that comes along. If your company's operations are in any way reliant on data stored on computers, you cannot afford to ignore the basic tenets of disaster recovery preparation. If data is not backed up a sufficient distance out of harm's way, your company may not survive the disaster. At some point, maintaining shareholder value and meeting regulatory criteria will become paramount in the disaster recovery discussion. I have distilled the basics of disaster recovery to a baker's dozen. Use this as a checklist to gauge -- and improve -- the effectiveness of your disaster recovery plan.

Transmis par jerome1604 le 26 mai 2006 à 19:33:22 CEST (2137 lectures)
(Suite... | 13 commentaires | Score: 5)
 session hijacking
TheorieSession hijacking, also known as TCP session hijacking, is a method of taking over a Web user session by surreptitiously obtaining the session ID and masquerading as the authorized user. Once the user's session ID has been accessed (through session prediction), the attacker can masquerade as that user and do anything the user is authorized to do on the network.
Transmis par jerome1604 le 25 mai 2006 à 11:27:21 CEST (2024 lectures)
(Suite... | 15 commentaires | Score: 0)
 release of the article called "Security"
Theorie


This is an announcement for the release of the article called "Security
Testing Demystified". This article has been written in very simple language
which can be understood not only by security testers but also can be read &
understood by non-technical managers as well.

Just to summarise, this article doesn't talk anything specific about a
particular type of attack rather demonstrate a holistic approach for
security testing.  At a broader level it covers the following areas -

Transmis par jerome1604 le 19 janvier 2006 à 13:27:04 CET (826 lectures)
(commentaires ? | Score: 5)
 Demystifying Denial-Of-Service attacks, part one
TheorieDemystifying Denial-Of-Service attacks, part one By Abhishek Singh, CISSP This paper provides an introduction to Denial of Service (DoS) attacks, their methodologies, common prevention techniques, and how they differ from Distributed Denial of Service (DDoS) Attacks. This article is intended to be a broad overview for the beginner or intermediate-level administrator on the different types of DoS attacks.
Transmis par jerome1604 le 27 décembre 2005 à 09:01:54 CET (1393 lectures)
(Suite... | 8 commentaires | Score: 0)
 Introduction: IP Spoofing
Theorie
Introduction: IP Spoofing  
Source: Suhas A Desai - Posted by: Benjamin D. Thomas   
Date: Thursday, 25 August 2005
  
Features An article on "Security Problems in the TCP/IP Protocol Suite" by S.M.Bellovin in 1989 initially explored IP Spoofing attacks . He described how Robert Morris, creator of the now infamous Internet Worm, figured out how TCP created sequence numbers and forged a TCP packet sequence.

This TCP packet included the destination address of his victim and using as IP spoofing attack Morris was able to obtain root access to his targeted system without a User ID or password.

Introduction:

IP spoofing is a technique used to gain unauthorized access to computers, whereby the attacker sends messages to a computer with a forging IP address indicating that the message is coming from a trusted host. There are a few variations on the types of attacks that using IP spoofing.

Transmis par jerome1604 le 12 septembre 2005 à 22:54:53 CEST (1322 lectures)
(Suite... | 1 commentaire | Score: 5)

Sélection de 2 Pages.
New Hoaxes
Sophos Hoaxes

 
New Viruses
Sophos Virus IDE.

 
Top Ten
Sophos Top Ten

 
Windows Software
La manchette de ce site n'est pas disponible pour le moment.
 
Security Focus
La manchette de ce site n'est pas disponible pour le moment.
 
Linux Software
La manchette de ce site n'est pas disponible pour le moment.
 
FrSIRT
 
Site réalisé avec le moteur PHP-Nuke en version Française

Tous les logos et les marques présents sur ce site, appartiennent à leurs propriétaires respectifs.
Les commentaires quand à eux, sont sous la responsabilité de ceux qui les écrivent.
Vous pouvez afficher nos articles sur votre site en utilisant le fichier backend.php ou ultramode.txt
Site réalisé avec le moteur PHP-Nuke Copyright © 2004 Tous droits réservés.
La version utilisée sur ce site est produite par PHP-Nuke Europe.
PHP-Nuke est un logiciel gratuit sous licence GNU/GPL.
Page Généré en: 0.118 Secondes
:: fiapple phpbb2 style by Daz :: PHPNuke theme by www.nukemods.com :: Enhanced by PHP-Nuke Europe ::