AMT Banner ADMINISTRATION SOFTWARE SITE MAP AMT SOFTWARE CONTACT AMT SOFTWARE PURCHASING FROM AMT SOFTWARE SEARCH AMT SOFTWARE SOFTWARE PRODUCTS LISTINGS AMT SOFTWARE HOME TOOLS AND UTILITY SOFTWARE DATA REPLICATION AND FAIL-OVER PRINT MANAGEMENT SOFTWARE NETWORK MANAGEMENT SOFTWARE EXCHANGE SERVER SOFTWARE SECURITY SOFTWARE DEPLOYMENT AND UPDATING SOFTWARE ACTIVE DIRECTORY SOFTWARE MANAGEMENT SOFTWARE FOR WINDOWS SERVERS BY AMT SOFTWARE

eEye Digital Security Papers

The following contains various published articles written by the eEye Digital Security Team members and friends which are also available on their website.

Take a moment to read some of these "thought provoking" information on security

Code Red Update
A new, more malicious worm dubbed "Code Red II" is spreading around the Internet allegedly more quickly than the first. At the same time, the original Code Red worm has been gaining steam since its reemergence on August 1st.

The Use of Application Specific Security Measures in a Modern Computing Environment
Current computer security practices tend to favor protecting the network as a whole, and avoid the specific issues regarding an application hosted on that network. This leads to problems with granularity. A traditional solution requires that all external defenses force specific applications to deal with their own security implications. This practice has flaws because not all implementations of a specific service are created equal.

CHAM (Common Hacking Attack Methods) and its use in Retina the Network Security Scanner.
eEye Digital Security incorporates its proprietary CHAM technology in most of its products. In this paper we focus on the use of CHAM in Retina, the Network Scanner. For many clients, CHAM provides a level of value added unmatched by any security product in the market.

FrontPage, the Front Gate to Your Web Server
We've all seen the banners "Microsoft FrontPage Support!" and "Microsoft Certified Solution Provider." The brilliant people at Microsoft have done it again. To compete as a web hosting company you need to have FrontPage support. Microsoft has made an easy to use product that has been set as the standard for end-user web development. The other thing Microsoft has done again is designing a product that, from the get-go, is insecure.

In God we trust, all others we monitor
In present society, individuals are being watched in every aspect of their lives. Privacy is no longer a privelige, but a desire. eEye has the ability to locate and analyze an individual's profile. For instance, eEye can trace a person back to every place they have ever lived and where their favorite places to shop are. If eEye can gather data about personal transactions, imagine what a government agency can find out about an identity.

Work place security extends to employee's homes?
Most computer savvy people by now have heard about cable modems. The technology behind cable modems might be a "tad" insecure itself but for the average home user it is a cheap way to get fast Internet access. It is also a good way to provide a fast connection for employees to work from home, and that is where the problem starts.

 

All trademarks are property of their respective owners or holders. Information subject to change without notice
Copyright © 2000 - 2015 AMT Software. All rights reserved.