120 Results for:smtp

  • Sort by: 

Beware of bare linefeeds in Exchange Server email

By Serdar Yegulalp 10 Jan 2007

A bare linefeed is a single linefeed character that isn't preceded by an ASCII carriage return. In some instances, virus scanners or security appliances will insert bare linefeeds into an Exchange Server email and ... Read More

What are the drawbacks to application firewalls?

By Michael Cobb 31 May 2007

Application-layer firewalls examine ingoing and outgoing traffic more carefully than traditional packet-filtering firewalls, so why are some holding back on deployment? In this SearchSecurity.com Q&A, Michael Cobb ... Read More

Stration worm targets Windows machines

By Bill Brenner 26 Sep 2006

The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments. Read More

How can header information track down an email spoofer?

By Michael Cobb 02 May 2007

Spammers can use spoofed headers to hide the true origin of unwanted email. In this SearchSecurity.com Q&A, application security expert Michael Cobb explains how to trust where a message is coming from. Read More

Security Bytes: ISS warns of new Microsoft Windows flaw

31 Jul 2006

Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw. Read More

Social Engineer Toolkit (SET) tutorial for penetration testers

19 Aug 2011

A social engineering toolkit helps address the human element aspect of penetration testing. Learn how to use Social Engineer Toolkit with this tutorial. Read More

Author delves into novel attack methodologies

20 Oct 2005

Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Read More

Myfip's Titan Rain connection

By Bill Brenner 30 Aug 2005

LURHQ researchers say the Myfip worm is a good example of the malcode Chinese hackers are using in the so-called Titan Rain attacks against U.S. government networks. Read More

BackTrack 5 tutorial Part I: Information gathering and VA tools

By Karthik Poojary 04 Oct 2011

Our BackTrack 5 tutorial covers information gathering and vulnerability assessment using BackTrack 5. Read More

Serve It Up with J2EE 1.4 - Use JCA 1.5 and EJB 2.1 to Extend your App Server

01 Jan 2003

J2EE application servers have become the standard for serving Web-based applications, and for good reason. Application servers provide a secure, reliable and manageable execution environment for Web applications ... Read More