Sasser author Sven Jaschan walked away free from a German court last month after receiving a 21-month suspended sentence for his crimes. With a job offer already in the bag, his future could be rosy. looks at the fate of Jaschan and other virus writers and hackers who have been convicted.
In this article
looks into one of the problems in detecting attacks for new vulnerabilities: code emulation.For increased intrusion detection efficiency, more and more honeypots must be set up in different locations, especially in different subnets. Usually this requires a large amount of administration effort, involving fine-tuning each of the honeypots' behaviour each time a new infection technique or exploit is discovered. This article describes how one company managed to extend their simple honeypot, designed to capture worms, to an easy manageable honey net.
Not satisfied by the answers provided by a Microsoft representative in last month's interview about security issues surrounding the Windows Mobile platform,
takes matters into his own hands and delves a little deeper.Since there is a lot of confusion over what, exactly, encompasses the Microsoft Windows Mobile platform, VB’s Technical Editor Morton Swimmer has provided the following brief run-down of the variations of the system.
Matt Ham finds NetWare 6.5 to be significantly more tolerable than previous versions of the operating system. Find out whether the products for NetWare show similar improvement.