Monthly Archives: April 2004

SQL Injection Signatures Evasion

In recent years, Web application security has become a focal center for security experts. Application attacks are constantly on the rise, posing new risks for the organization. One of the most dangerous and most common attack techniques is SQL Injection, which usually allows the hacker to obtain full access to the organization´s Database.

The expiry date of viruses

One of the most infamous computer viruses of all time was the Friday 13 virus. The reason it was given this name is very simple: this is the date when it deleted all the files with an .EXE extension from affected computers.

Web Application Worms: Myth or Reality?

This paper discusses the possibility of automated, self-propagating attacks on custom Web application code. It will show that such attacks are not only feasible but that their theoretical success rate is far greater than worms targeting commercial infrastructure. It is the intent of this paper to raise awareness of the threat posed by automated attacks… Read More »

Application Security – Next Layer of Protection

Many companies are just now beginning to realize the importance of web application security. Some are learning the hard way. Most veteran security professionals are aware of common Unix applications that have been historically vulnerable such as versions of BIND/DNS, FTP, Sendmail and Apache Web Server.

The Pros & Cons of Ethical Hacking

The use of ethical hackers to test for security vulnerabilities is as old as the IT hills. But, unless there are clear goals outlining why and to what extent your organization is engaging them, the outcome could be useless information — or worse.

Building Wireless Community Networks 2/e

Nowadays, with Wireless enabled computers almost as common as Ethernet, it makes sense to more people and organizations to make the next step and connect their networks using wireless technology. If you or your community is planning to get online using wireless network technology, Flickenger’s book “Building Wireless Community Networks” is exactly where you need… Read More »