Author: JT Smith
Category:
- Linux
Author: JT Smith
During a security workshop on Friday, a Microsoft Research scientist demonstrated how the hidden copyright fingerprint is so
securely affixed to the audio that it remains intact even if a jazz song is played aloud on speakers in a noisy room and then
re-recorded.”
Author: JT Smith
Author: JT Smith
Category:
Author: JT Smith
Author: JT Smith
W32/Hello, an Internet worm that affects Windows machines,
arrives via MSN Messenger as a file called Hello.exe.”
Category:
Author: JT Smith
Category:
Author: JT Smith
Category:
Author: JT Smith
Victim is configured to represent the worst possible system
configuration from a security standpoint. It is running several
services that have known vulnerabilities. However, victim is only
supposed to be a web server. Victim has been calibrated as a web
server using CylantSecure. CylantSecure is victim’s first, last
and only line of defense.
“Victim is our way of saying that you don’t have to have your systems
vulnerable to the latest and greatest attack”, says Scott Wimer,
VP of Business Development at Cylant. “Nearly all software has
vulnerabilities; most of them just happen to be unknown. Victim
simply has more than most administrators would feel comfortable
with”, he says.
The web site
victim.cylant.com lists the various services
running on victim, since “doorknob attacks” are highly unlikely
to succeed. Details of the challenge are also available there.
About Cylant Technology
Cylant Technology is a software measurement company creating enabling
tools and technologies for the development of high availability
software. Their static and dynamic software measurement technologies
are directly applicable to the areas of security, reliability,
maintainability, testability, and survivability. Founded by Dr. John
C. Munson in 1999, Cylant has done projects for Sun Microsystems,
JPL, DARPA, and other organizations. For further information please
consult
www.cylant.com, or contact Scott Wimer
scottw@cylant.com
(541) 322-5656.”