ACMQueue
Fri, Jun 29, 2007
Columns: Curmudgeon Geek@Home Interviews Kode Vicious | Conference Calendar Issue Index Site Map |












CRC Career Resource Center
· Software Developer/ R&D
· Computer Instructor
· Director of Web Communications
· As. and Associate Professors of Computer Science
· Technical Writer/ Editor


Queue focus: Security

   


Security

A Behavioral Approach to Security
The CTO of Finjan, Yuval Ben-Itzhak, makes a strong case for a new approach to security that relies more on analyzing the behavior of suspicious code than signatures that have to developed after the attacks have already started.

The Silent Security Epidemic
Ryan Sherstobitoff, CTO of Panda Software, describes what new types of sophisticated attacks are being created and what proactive steps developers need to take to protect their applications.

The Seven Deadly Sins of Linux Security
Avoid these common security risks like the devil
Bob Toxen, Horizon Network Security
from the API Design issue, May/June 2007

A Conversation with Cory Doctorow and Hal Stern
Considering the open source approach: Queue listens in on a rare meeting between a popular sci-fi author and a Sun VP.
from the DNS issue, April 2007

The Evolution of Security
The risk-management strategies of honeybees can teach us a lot about security.
Daniel E. Geer, Verdasys
from the DNS issue, April 2007

A Conversation with Jamie Butler
Coauthor of Rootkits: Subverting the Windows Kernel explains why it's OK to make rootkit code publicly available.
from the Open Source Security issue, February 2007

On the Receiving End
A sad truism is that to write code is to create bugs
Eric Allman, Sendmail
from the Open Source Security issue, February 2007

Intellectual Property and Software Piracy
Transcript of 'The Power of IP Protection and Software Licensing', our interview with Aladdin vice president Gregg Gronowski
from the Open Source Security issue, February 2007

One Step Ahead
Threats from rogue employees and partners exist inside the perimeter.
Vlad Gorelik, Sana Security
from the Open Source Security issue, February 2007

Open vs. Closed
Which source is more secure? The debate rages on, but what are the real pros and cons?
Richard Ford, Florida Institute Of Technology
from the Open Source Security issue, February 2007

The Criminal Mind
We're all vulnerable to cybercrime.
Charlene O'Hanlon, ACM Queue
from the Cybercrime issue, November 2006
Defy all challenges with Microsoft® Visual Studio 2005.

Playing for Keeps
The only alternative to the problem of complexity vs. security is to make computing not be so general purpose.
Daniel E. Geer, Verdasys
from the Cybercrime issue, November 2006

Cybercrime - An Epidemic
Can we protect ourselves from the hazards of an online world?
Team Cymru
from the Cybercrime issue, November 2006

Seeking Compliance Nirvana
Don't let SOX and PCI get the better of you
Greg A. Nolann
from the Compliance issue, September 2006

Pointless PKI
PKI without a Cause
Kode Vicious
from the HCI issue, July/August 2006

Phishing for Solutions
Phishing provides a cornucopia of challenging programmatic puzzles
Kode Vicious
from the Web Services issue, May 2006

Vicious XSS
Cross-Site-Scripting Attacks
Kode Vicious
from the Systems of Scale issue, December 2005 / January 2006

The Doctor is In
You get back a pointer to destination, which presumably you passed to the API in the first place. The logic for this escapes me.
Kode Vicious
from the Social Computing issue, November 2005

A Conversation with Peter Tippett and Steven Hofmeyr
Two experts discuss biomedicine, cyberwarfare, and security
from the Security issue, June 2005

Security: Problem Solved?
Solutions to many of our security problems already exist, so why are we still so vulnerable?
John Viega, Secure Software
from the Security issue, June 2005

The Answer is 42 of Course
If we want our networks to be sufficiently difficult to penetrate, we've got to ask the right questions.
Thomas Wadlow, Independent Consultant
from the Security issue, June 2005

On Feeling Secure in an Unsafe World
Freedom from fear, anxiety, danger, and doubt.
Randy Harr, Queue Editorial Advisory Board
from the Security issue, June 2005

The Guru Code
Does anyone actually know what these codes mean?
Edward Grossman, Editor, ACM Queue
from the Error Recovery issue, November 2004

Electronic Voting Systems: the Good, the Bad, and the Stupid
Is it true that politics and technology don’t mix?
Barbara Simons
from the RFID issue, October 2004

VoIP Security: Not an Afterthought
DDOS takes on a whole new meaning
Douglas C. Sicker and Tom Lookabaugh, University of Colorado at Boulder
from the VoIP issue, September 2004

Is Hierarchical Public-Key Certification the Next Target for Hackers?
Considering alternatives to hierarchical authentication structures that are not sufficiently secure for communication on open networks such as the Internet.
Mike Burmester, Yvo G. Desmedt - Florida State University
from the Virtual Machines issue, July/August 2004

The Spinning Cube of Potential Doom
Practically every computer linked to the Internet is constantly being scanned for security vulnerabilities and targeted for attack by viruses, worms, and worse.
Stephen Lau, NERSC
from the Virtual Machines issue, July/August 2004

Security Is Harder Than You Think
Still waiting for your set-it-and-forget-it fantasy about SSL to become reality?
John Viega and Matt Messier, Secure Software
from the Virtual Machines issue, July/August 2004

Building Systems to be Shared Securely
Running multiple virtual servers on one machine makes sense, but what happens when not everyone plays nice?
Poul-Henning Kamp, FreeBSD Developer, and Robert Watson, McAfee Research
from the Virtual Machines issue, July/August 2004

The Insider, Naivety, and Hostility: Security Perfect Storm?
Firewalls don't protect you from insiders unintentionally (or otherwise) giving out free passes to the corporate intranet.
Herbert H. Thompson, Security Innovation, and Richard Ford, Florida Institute of Technology
from the Security issue, June 2004

Security: The root of the problem
Why is it we can't seem to produce secure, high-quality code?
Marcus J. Ranum
from the Security issue, June 2004

Blaster Revisited
A second look at the cost of Blaster sheds new light on today's blended threats.
Jim Morrison, Symantec Security Services
from the Security issue, June 2004

The New Screen of Death
Is security a problem that just can't be solved?
Edward Grossman, Editor, Queue
from the Security issue, June 2004

Instant Messaging or Instant Headache?
Sure, it increases your productivity, but at what cost?
John Stone and Sarah Merrion, Symantec
from the Enterprise Search issue, April 2004

The GIGO Principle and Voting Machines
Voting Machine Hell
Jef Raskin, Independent Consultant
from the Enterprise Search issue, April 2004

Sensible Authentication
Is there a failproof way to confirm someone's identity?
Bruce Schneier, Counterpane Internet Security
from the Game Development issue, February 2004

A Conversation with Mario Mazzola
"...if anything, the rate at which changes are being made is going to accelerate, not diminish."
Stu Feldman
from the The Wireless Revolution issue, May 2003

Securing The Edge
If you have any geeks working for you, do you realize they may have tunnels behind your firewall to their home machines?
Avi Freedman, Akamai Technologies
from the Building Web Services issue, March 2003

Queue Partners




Free QueueNews Email Newsletter
QueueNews is a weekly newsletter featuring a listing and excerpts of the latest articles to appear on Queue's Web site.
Subscribing is quick and easy! Just fill out the form below.
- HTML version
- plaintext version
Please type in the captcha number:
 
privacy policy


Place Your Link Here
AllinfoDir Web Directory Apartments for rent Counter Strike Hacks Credit Cards Elegant Directory
Web development & buy MLB tickets.
Free Themes online blackjack osCommerce Modules & Mods phone cards WoW Hacks


ACM Home
About Queue Advertise with Queue Advisory Board Back Issues Contact Us Dev Tools Roadmap Free Subscription Privacy Policy Writer Faq RSS feeds
© ACM, Inc. All rights reserved.