A+ R A-

Legacy Security Articles

This e-mail address is being protected from spambots. You need JavaScript enabled to view it

Organizations throughout the world are adopting Linux as their production platform. By connecting to the Internet to provide critical services, they also become targets of opportunity. To help protect these Linux systems, this article covers the basics of securing a Linux box. The examples provided here are based on Red Hat 6.0, but should apply to most Linux distributions.

By Edward Toppe

Spyware and adware is advertising supported software that allows its publishers to snoop on a computer user's internet activity.

It is designed to obtain information about computer users and their surfing behavior usually without their knowledge or consent. Spyware is potentially more harmful than Adware because it can record your keystrokes, history, passwords, credit card number and other confidential and private information. Besides spyware and adware, computers can also be infected with my other internet parasites such as Winfixer 2005, viruses, trojans, dialers, etc.

By Shanna Riley

You've heard all kinds of terrible things about it, but just what IS it - and how does it get on your computer in the first place?

Matthew Ghio Last Updated: May 1 1994

The newest version of this document can be obtained by sending mail to: mg5n+ This e-mail address is being protected from spambots. You need JavaScript enabled to view it  Automated software will email you a copy. I try to keep this info as up to date as possible, but I may have missed something.  If there are any errors, or if you have anything to suggest or contribute, please let me know.

By Mitch Johnson

Companies have begun to take a stance against spyware by implementing spyware tools across their entire network. In the recent past Infoworks Technology and Unisys developed a partnership when Infoworks announced they would be providing their SpyRemover software for the entire Unisys use enterprise.

By Gary Gresham

The online scams on the Internet are hidden like landmines, ready to explode on the unsuspecting surfer who happens to believe what they say. These web scams have the ability to take not just your cash but also your identity if you don't know how to protect yourself.

By Rohitab Batra

;Compiling (Turbo Assembler)

; c:\>tasm32 /ml /m3 /t /w2 /s /p /dDEBUG=1 BlackBat


;Setting DEBUG=0 will compile the virus in Release mode. In this mode, an error; message will be displayed, so that you don't accidently compile in release mode. ;In Release mode, the size of the Virus will be smaller, and .EXE files will be; infected, instead of .XYZ files. In Debug mode, the file NOTEPAD.EXE, if found; in the current directory, will be infected.

By Marcos Christodonte II, CISSP

With the increased reliance on the Internet for everyday activities, attackers are looking for the largest online channels to infiltrate networks. Regular browsing for entertainment or research is becoming risky business. Websites using web 2.0 technologies such as MySpace and Face Book are key platforms to reach users for social engineering exploits. Moreover, advertising networks are becoming the newest targets of malvertising (malicious advertising), particularly those who syndicate by reselling their ad space to third parties. This article briefly outlines the risk of malvertising, social networking, and need for a defense-in-depth approach to combating these threats.

By Allen Brown

If you are actively working online than there is a huge possibility that in some way Spyware will get installed in your computer. After all, it takes is only clicking the wrong site or by downloading some programs. Nowadays there is a new form of Spyware everyday, which has been created by the people or company that is desperately seeking information. Spyware is also known as a great damager to the companies. It is not so noticeable like spam and virus attacks to the systems.

Page 1 of 14

Get email updates