Email Alerts
-
The technical foundations of hacking - from 'Certified Ethical Hacker Exam Prep'
This chapter from 'Certified Ethical Hacker Exam Prep' by Michael Gregg discusses attacker methodology, as well as some of the methodologies used by ethical hackers. Ethical hackers differ from malicious hackers in that ethical hackers seek to do no ... Chapter Download
-
Introduction to Ethical Hacking - from Hacking For Dummies
This chapter from Hacking For Dummies by Kevin Beaver helps security professionals understand how malicious users think and work, enabling them to defend their systems against attacks and to identify security vulnerabilities. Chapter Download
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th... School
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... School
-
Defeating Evil Twin attacks
Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a... School
-
Lesson 3 quiz: Who goes there?
Put your new knowledge of wireless access to the test. School
-
FastFacts on spyware
This quick guide will get you up to speed on spyware with a definition, tips on recognizing the warning signs of spyware and advice for removing it from your computer. Networking FastFacts
-
Security and compliance issues will dominate the new year
Puneet Mehta offers his prognostications on what you can expect in the field of networking in 2006. TechColumn
-
Our top expert Q&As of '05
SearchNetworking.com's Ask the Expert section is the place where our elite experts answer our reader's questions. They cover topics like network administration, security, network and systems management, routing and switching, certifications, IPv6 and... The best of SearchNetwork
-
FastFacts on network vulnerabilities
Each year brings with it new and malicious viruses, worms and other threats to the world of IT. And each year, the SANS Institute publishes its "Top 20 Internet Security Vulnerabilities." In this edition of Networking FastFacts, we've highlighted tho... Networking FastFacts
Network Management Strategies for the CIO