120 Results for:smtp
- Sort by:
Beware of bare linefeeds in Exchange Server email
10 Jan 2007A bare linefeed is a single linefeed character that isn't preceded by an ASCII carriage return. In some instances, virus scanners or security appliances will insert bare linefeeds into an Exchange Server email and ... Read More
What are the drawbacks to application firewalls?
31 May 2007Application-layer firewalls examine ingoing and outgoing traffic more carefully than traditional packet-filtering firewalls, so why are some holding back on deployment? In this SearchSecurity.com Q&A, Michael Cobb ... Read More
Stration worm targets Windows machines
26 Sep 2006The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments. Read More
How can header information track down an email spoofer?
02 May 2007Spammers can use spoofed headers to hide the true origin of unwanted email. In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to trust where a message is coming from. Read More
Security Bytes: ISS warns of new Microsoft Windows flaw
31 Jul 2006Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw. Read More
Social Engineer Toolkit (SET) tutorial for penetration testers
19 Aug 2011A social engineering toolkit helps address the human element aspect of penetration testing. Learn how to use Social Engineer Toolkit with this tutorial. Read More
Author delves into novel attack methodologies
20 Oct 2005Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Read More
Myfip's Titan Rain connection
30 Aug 2005LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. Read More
BackTrack 5 tutorial Part I: Information gathering and VA tools
04 Oct 2011Our BackTrack 5 tutorial covers information gathering and vulnerability assessment using BackTrack 5. Read More
Serve It Up with J2EE 1.4 - Use JCA 1.5 and EJB 2.1 to Extend your App Server
01 Jan 2003J2EE application servers have become the standard for serving Web-based applications, and for good reason. Application servers provide a secure, reliable and manageable execution environment for Web applications ... Read More