Already a member? Log in

Sign up with your...


Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share This URL With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

Links 1 through 10 of 43 by Ken Robson tagged security

When configuring GAL Sync using Microsoft’s Identity Integration Feature Pack (IIFP) you are asked to provide a domain account for use by each Management Agent. Most organisations would not want to provide an account with elevated privileges (e.g. Enterprise Admins or Domains Admins). The IIFP help documentation provides some information on what level of permissions are required for these accounts, but does not provide a good level of detail. In an effort to provide some clarity, this article describes a simple GAL Sync scenario and provides specific guidance on what permissions are required.

Share It With Others!

Abstract: Financial Cryptography is substantially complex, requiring skills drawn from diverse and incompatible, or at least, unfriendly, disciplines. Caught between Central Banking and Cryptography, or between accountants and programmers, there is a grav

Share It With Others!

Ettercap is a suite for man in the middle attacks on LAN. It features sniffing of live connections, content filtering on the fly and many other interesting tricks.
It supports active and passive dissection of many protocols (even ciphered ones) and includ

Share It With Others!

IT professionals spend a lot of time thinking about security, and ways to make sure their systems are patched as quickly as possible. However, what goes on before they hear about a vulnerability is mostly a mystery. To get a clearer picture, we talked to

Share It With Others!

This is one of the key questions many new sys admin ask:

How do I audit file events such as read / write etc? How can I use audit to see who changed a file in Linux?

Share It With Others!

I gave a course at the SELinux Symposium on using SELinux in Red Hat Enterprise Linux 4. After the talk, I was amazed at how many people came up to me and said they wish they had this talk before som

Share It With Others!

This paper describes the problems related to shared directories such as /tmp and /var/tmp as well as problems related to having multiple SE Linux security contexts used for accessing a single home directory. It then provides detailed information on the so

Share It With Others!

One of the key aspects of securing a system is to ensure separation and containment between different concerns. This could be between processes and communications within a single machine; through to different applications and network segments in an enterp

Share It With Others!

The following rule can be added to the /etc/sysconfig/iptables to add syslog

-A RH-Firewall-1-INPUT -j LOG

The above example adds logging within the default RH-Firewall-1-INPUT chain and would normally be placed near the end of the chain,

Share It With Others!

These days, data is mobile. Every day, sensitive corporate data leaves a company’s headquarters on a flash drive or an employee’s laptop. Regardless of where it is going, mobile data can be an I.T. department’s worst nightmare.

Share It With Others!