NT Security in an Open Academic Environment
Stanford Linear Accelerator Center (SLAC) was faced with the need to secure its PeopleSoft/Oracle business system in an academic environment which only has a minimal firewall. To provide protected access to the database servers for NT-based users all over the site while not hindering the lab's open connectivity with the Internet, we implemented a pseudo three-tier architecture for PeopleSoft with Windows Terminal Server and Citrix MetaFrame technology
The Design and Analysis of Graphical Passwords
In this paper we explore an approach to user authentication that generalizes the notion of a textual password and that, in many cases, improves the security of user authentication over that provided by textual passwords.
Dealing with Public Ethernet Jacks - Switches, Gateways, and Authentication
This paper describes the tools and techniques developed and deployed to address the problem of blocking unauthorized users on unprotected Ethernet jacks.
A Retrospective on Twelve Years of LISA Proceedings
System administrators don't have a lot of time for introspection of their field. So work is repeated and new administrators, or people trying to do research on system administration, don't know where to start. To provide a starting point, we have examined the last twelve years of LISA proceedings and have categorized the papers in two separate ways
Bro: A System for Detecting Network Intruders in Real-Time
With growing Internet connectivity comes growing opportunities for attackers to illicitly access computers over the network. The problem of detecting such attacks is termed network intrusion detection, a relatively new area of security research
A Secure Environment for Untrusted Helper Applications - Confining the Wiley Hacker
Download Free
Building Systems That Flexibly Control Download Executable Content
Download Free
Registry Hacks for Servers
Advanced users of Windows XP are used to digging around in the Registry looking for ways to tweak performance or push the envelope of Windows' abilities. Provided you back up your Registry before hacking it, no harm usually comes from such endeavors.
Adaptive Network Security: Moving from Implicit to Explicit Permissions
With the frequency and severity of attacks increasing, and organizations relying increasingly on networked automation to gain a competitive edge, is it finally time to reconsider the prevailing approach to network security? How can corporations ensure that users get the network access they need, without jeopardizing the security of the network?
Disaster Recovery Planning in the Calm Before the Storm
The devastating hurricane season of 2005 won't be forgotten any time soon. So how is the coming hurricane season, which will officially begin June 1, likely to measure up?
IO-Lite: A Unified I/O Buffering and Caching System - Free eBook IO-Lite: A Unified I/O Buffering and Caching System - Download ebook IO-Lite: A Unified I/O Buffering and Caching System free
|