Security Portal: Ask Buffy - Unix security tools, security of named pipes and encrypted stream attack detection
Jan 04, 2001, 06:03 (0 Talkback[s])
(Other stories by Buffy)
"This week's questions are about collecting exploits; Unix
security tools; CryptoCard RB-1 token message authentication;
removing JS Seeker with Norton AntiVirus 2001; security of named
pipes; and encrypted stream attack detection."
"What are your URL suggestions for collecting exploits? We have
a test lab and have permission to begin testing our IDS for
vulnerabilities...."
"I am compiling a list of cybersecurity Unix tools that are
available on the market. Could you point me in the right
direction?..."
Complete
Story
Related Stories:

