Articles on Networking
- Malware Honeypots as Part of a Modern IT Infrastructure Honeypots are decoy systems designed to be attacked. They slow intruders, decrease false positives (any connection is suspicious), capture malware samples, and reveal attacker intentions. The main...
- Malware Malware That Modifies the Routing Table on Infected Hosts Beyond modifying hosts files to block access to security domains, malware can modify the routing table on infected hosts after receiving null-routing instructions through HTTP-based C&C channels....
- Encryption 3 Steps to Improving Your Data Safeguards
- Assessments 5 Security Assessment Steps for Mid-Sized Firms
- Malware Stopping Malware on its Tracks
- Networking Inside Network Perimeter Security, the Book