Gates Said Security Is Simple -- In this op-ed, O'Reilly authors Mark G. Graff and
Kenneth R. van Wyk respond to Bill Gates' assertion that firewalls and
up-to-date software are perfectly adequate protections against security
problems, and that perfect code isn't necessary. Mark and Kenneth are the
authors of Secure
Coding: Principles & Practices.
securecoding.org: Vulnerability Analysis -- Mark G. Graff and Kenneth R. van Wyk are providing
ongoing analysis of the root causes of some recent vulnerabilities (often
it is
in the development process that flaws are introduced),
and they offer ways of preventing similar mistakes in the future. Mark and
Kenneth are
the authors of Secure Coding:
Principles & Practices.
Secure Cooking with Linux, Part 3 -- Learn how to use PAM to
restrict authentication on Linux systems and how to use SMTP to accept
connections from arbitrary clients securely in these latest sample recipes
from
Linux Security
Cookbook.
Secure Cooking with Linux -- Learn how to authenticate by public key,
encrypt backups, and
combine log files in this first of three sets of recipes selected by the
authors of Linux Security
Cookbook.
Security
Vulnerability Reporting -- Recently, the Organization for Internet
Safety (OIS) released a draft proposal
on a protocol for discovering and responsibly disclosing software
vulnerabilities in products. Mark Graff and Kenneth R. van Wyk offer their
concerns in this op-ed piece. They're the authors of O'Reilly's new Secure Coding:
Principles & Practices.
Saving
Our Bacon: Snort Security Holes and Strategies for Safe Network
Monitoring -- Bob Byrnes reviews past
attacks and recently discovered buffer-overflow vulnerabilities in Snort, a
popular security-monitoring tool used for detecting suspicious network
activities. He also discusses strategies you can use to minimize risks. Bob
is a coauthor of Linux Security
Cookbook.
Secure Programming Techniques, Part 2 -- Here is advice both on what to do
and what not to do when you are coding a new network program, excerpted
from O'Reilly's Practical
Unix & Internet Security, 3rd Edition.
Secure Programming Techniques -- O'Reilly authors Simson Garfinkel, Gene Spafford, and Alan Schwartz bring you tips and general design principles to code by to help you avoid security-related bugs, in this excerpt from Practical Unix & Internet Security, 3rd Edition.
Security in
IPv6 -- With security issues at an all-time high, it's not too early
to begin reading about how internet security will change with IPv6, the
first major upgrade of the Internet Protocol. Chapter 5 of IPv6
Essentials will take you through types of threats, IPv6 security
elements, solutions, and much more. Requires an O'Reilly Network Safari
Bookshelf subscription. Get
your free trial here.
Microsoft
Forms Academic Advisory Board -- Gene Spafford will be offering
objective critiques and advice as a member of a new academic advisory board
for Microsoft. Read about the new board in this eWeek
article. Gene is a coauthor of Practical Unix &
Internet Security, 3rd Edition.
Cooking with DNS and BIND -- Here are some security-related recipes that
show you how to configure a name server to conceal its version, hide its
primary master, create a stealth slave, work with a firewall, and more,
excerpted from DNS & BIND
Cookbook.
Protecting Privacy with Translucent Databases -- Simson Garfinkel explains
how Yale could have shielded its admissions data from recent attacks had it
used a translucent database. For more on minimizing Web security risks, pick
up Simson's book, Web
Security, Privacy & Commerce, 2nd Edition.