|
InformIT
Security
Newsletter
Sep 21, 2004
|
|
Win an iPod mini!
Solve the Find the Bug Challenge! and you could win an iPod mini and a copy of Adam Barr's brand-new book, Find the Bug: A Book of Incorrect Programs. It's all part of Bookpool's 10th Anniversary Celebration going on now at www.bookpool.com. While there, check out this month's special sales on Addison-Wesley, Prentice Hall PTR, and Cisco Press titles.
Visit Our Sponsor
|
|
|
|
![spacer]() |
Security
Reference Guide
Your Hosts
Cyrus Peikari
and
Seth Fogie
|
Last week we posted an
article written by Ratter, the author of the first Windows CE virus.
This week we look at the techniques Ratter used to create the
virus, including a previous unknown method for hooking into DLLs without
the standard import section using what could be considered one of the
first vulnerabilities/exploits for Windows Mobile.
In addition, we have an article titled Electronic Evidence Can't Be Shredded
that outlines the many problems associated with data storage and its
value as evidence. How do you handle email storage? Are you backing
this data up? Are your users aware that their emails may be available
for evidence 10 years from now? These are all questions IT
administrators need to answer. Related to this is another article titled
Executing an IT Audit for
Sarbanes-Oxley Compliance that provides you with a guideline on
performing your own audit.
Finally, we have updated the Security Reference Guide with a new section
on Natural Wireless Jamming where we clearly illustrate just how
damaging Bluetooth, wireless phones, and microwaves can be to your
wireless network. As always, please check out the blog section and feel
free to comment on Virus Disclosure!
|
Visit The Security Reference Guide
|
| |
![spacer]() |
| |
New Content
Subscribe to the Security Reference Guide RSS feed.
New Books and Safari Online Books
|
![spacer]() |
![spacer]() |
|
Biometric Authentication: A Machine Learning Approach
As they improve, biometric authentication systems are becoming increasingly indispensable for protecting life and property. This book introduces powerful machine learning techniques that significantly improve biometric performance in a broad spectrum of application domains. Find out more.
|
|
Grab Our Security RSS Feed
You can get our Security Reference Guide additions and weblogs in your RSS Aggregator click here to grab the code!
|
|
Weblog of the Week: Picture Perfect Virus
Microsoft announced a flaw in the way certain of its components handle JPEG processing. In other words, a specially crafted JPEG could potentially infect and damage your files, merely by looking at the bad picture while surfing the web. Find out if you're vulnerable.
|
|
Become a Member and Save up to 25% in Our Book Store!
Profile yourself with InformIT and you'll receive an additional discount — up to 25% off many titles in the InformIT Book Store. The best part is that this offer will never expire!
|
|
|
![]() |