Security Testing

  • Snort Review - Open Source Intrusion Detection and Prevention

    You may be wondering about IDS and IPS, and which system has a proven track record, excellent performance and accuracy, and what will be around for the long term. If you haven't heard of Snort, you may be surprised at how much one of the best offers...
    By Lee Clemmer May 5, 2010 

  • The Best Free Vulnerability Scanners

    Vulnerability scanners help find weaknesses quickly and automatically which otherwise might have been missed. There are many excellent commercial vulnerability scanners, but some of the best are free. This article highlights some of the best free vulnerability...
    By Lee Clemmer May 5, 2010 

  • Privilege Escalation

    The 2nd article in this series on the principle of least privilege examines privilege escalation and the related risks of users obtaining more or different privileges than the developer of an application intended possible. Vulnerabilities become exploits...
    By Lee Clemmer May 5, 2010 


  • A Beginners Guide to Penetration Testing

    Penetration Testing can seem like a black art to a beginner. To an IT veteran not specializing in security it may seem as simple as buying a product and clicking a few buttons. Neither of these ideas is true. Here we'll examine how to get started...
    By Lee Clemmer May 5, 2010 

  • The Top 5 Free Port Scanners

    Port scanners are key tools for network and systems security professionals. Fortunately, the best of these are free and/or Open Source. This article examines and compares the top five free port scanners available. If you don't already have at...
    By Lee Clemmer May 5, 2010 

  • The Top 5 Free Penetration Testing Tools

    Penetration Testing uses a variety of specialized tools to make testing far faster and more effective at discovering vulnerabilities. Five of the top tools are highlighted in this article. We examine why these penetration testing tools are great at discovering...
    By Lee Clemmer May 5, 2010 


  • The Top Ten Most Useful Security Tips for Mac OS X

    This article outlines some of the ten best tips to put into place to secure your Mac OS X operating system.
    By Lashan Clarke May 5, 2010 

  • How to Scan Your Computer for Security Risks

    With all the breathtaking security risks to our computers out there, it’s equally breathtaking that many people don’t bother to scan their computer to see if they’re vulnerable to a hacker or other threats.
    By Greg Brian November 25, 2009 

  • How Secure Are Your Small Business PCs?

    You can have an anti-virus solution, security cameras, spam filters, firewalls, and password-protected screen savers, but, your small business PCs still may not be totally secure.
    By Joli Ballew September 20, 2008 

showing 31-39 of 39 < Previous   |   page: 1   2   3   4   |   Next >

ADDITIONAL INFO