Search This Blog

Friday, July 01, 2005

WindowSecurity.com - Monthly Article Update

WindowSecurity.com - Monthly Article Update

Hi Security World,

New articles added to WindowSecurity.com last month:

Title: Share Permissions
Author: Derek Melber
Summary: All production Windows networks need to have resources (folders, files, documents, spreadsheets, etc) made available from servers so users on the network can access them. The way this is done is through the use of shared folders configured on the servers which house the resources. The concept of shared folders has not changed over the generations of Windows operating systems and versions, but the protection of the resources has slightly changed. Whether you are new to the concept of shared folders or an expert, this article will take an in-depth look at the pitfalls and suggested methods on how to protect the resources that are shared from servers to users on the network.
Link: http://www.WindowSecurity.com/articles/Share-Permissions.html

Title: The Student, the Teacher, and Optix Pro (Part 1)
Author: Don Parker
Summary: In this article series we will learn about a Trojan called Optix Pro. This is an especially lethal Trojan. With the first Part we will cover a little of Trojan history, see our fictional college’s network, and round out with our fictional student physically infecting his professor’s computer.
Link: http://www.WindowSecurity.com/articles/Optix-Pro-Part1.html

Title: NAT Traversal (NAT-T) Security Issues
Author: Deb Shinder
Summary: In this article, we’ll look at how NAT-T (Network Address Translation-Traversal) works and what the security issues are, help you decide whether to take the risk, and show you how to restore XP’s ability to connect to servers behind a NAT if you choose to do so.
Link: http://www.WindowSecurity.com/articles/NAT-Traversal-Security.html

Title: Evaluating a New Security Policy
Author: Brien Posey
Summary: There was a time when it wasn’t all that risky to try out new security settings on production servers, but operating systems have become much more complex since then. Today, even changing something as simple as the required password length can have unanticipated side effects elsewhere in the system. In this article, I will explain how to evaluate a new security policy in a safe and responsible manner.
Link: http://www.WindowSecurity.com/articles/Evaluating-New-Security-Policy.html

Title: Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 3)
Author: Don Parker
Summary: In this last part of the three part series based on shellcode obfuscation, we will actually substitute the well known NOP sled for one of a differing function. We will also see what, if any, changes are noticed by Snort.
Link: http://www.WindowSecurity.com/articles/Obfuscated-Shellcode-Part3.html

Title: Hiring Hackers As Security Consultants
Author: Brien Posey
Summary: The subject of whether it is ethical to use former hackers to evaluate a network’s security is a topic that is often hotly debated. In this article, I will explore the pros and cons of using former hackers in such roles.
Link: http://www.WindowSecurity.com/articles/Hackers-Security-Consultants.html

Title: Code Signing: Is it a Security Feature?
Author: Deb Shinder
Summary: Code signing is a mechanism whereby publishers of software and content can use a certificate-based digital signature to verify their identities to users of the code, thus allowing users to decide whether or not to install it based on whether they trust the publisher. Code signing has been touted as a major security feature, but it’s important for users to understand its uses and its limitations. In this article, we’ll take a look at how code signing works and where it fits into your organization’s security plan.
Link: http://www.WindowSecurity.com/articles/Code-Signing.html

Title: Obfuscated Shellcode, the Wolf in Sheep's Clothing (Part 2)
Author: Don Parker
Summary: In this second part we will actually see what a NOP sled is, and looks like. Furthermore, we will use an exploit with an existing NOP sled to see how it shows up on an IDS such as Snort with a default ruleset in place.
Link: http://www.WindowSecurity.com/articles/Obfuscated-Shellcode-Part2.html

Visit the Subscription Management (http://newsletter.isoftmarketing.com/) section to unsubscribe.
WindowSecurity.com is in no way affiliated with Microsoft Corp.
For sponsorship information, contact us at advertising@windowsecurity.com

Copyright © WindowSecurity.com 2005. All rights reserved.

No comments: