![]() One of this month's SANS Institute Webcasts might address the use of honeypots. Using a honeypot or network of honeypots can be helpful in learning how and why intruders attempt to penetrate your network. For an annual contribution of $150 for corporations or $75 for individuals, the project mails in March and September a copy of the most recent Honeywall CD-ROM another CD-ROM containing updated whitepapers, tools, and documentation and a print newsletter that contains "all the new work that has occurred in the past six months." The subscription sounds like a great way to give something back to the project in exchange for its hard work in providing great tools and information to help you with your security endeavors. On July 20, the Honeynet Project announced a subscription program that serves as a way for you to support the project and gain some added value at the same time. You can download a copy of the CD-ROM image (at the URL below, about 50MB in size,) from the Honeynet Project Web site. For example, you could add Secure Shell (SSH) keys, set your IP address preferences, and so on, then burn a CD-ROM so that when you boot to the CD-ROM, your system is configured and ready for use. You can add items you might need or make configuration changes to suit your environment. The Honeywall CD-ROM is based on a trimmed-down version of Linux and is configurable both before and after boot-up. In the May 19 edition of this newsletter, I discussed the new Honeywall CD-ROM available from the Honeynet Project. In Focus: Honeywall CD-ROM and Internet Storm Center =īy Mark Joseph Edwards, News Editor, mark at ntsecurity dot net Plus, you'll learn how to make identity management work with your existing infrastructure. ![]() In "Understanding the Identity Management Roadmap and Role of Your Microsoft Infrastructure" you will learn how companies are making progress on the road to identity management and how they've leveraged Active Directory to do it. Having a sound identity management strategy eliminates this complexity while automating resource intensive management functions, such as password management, approval processes and the set up and deletion of users as they join and leave the company. ![]() = Sponsor: Free OpenNetwork White Paper =īusinesses are often overburdened with numerous identity repositories, authentication processes and administration systems. ![]() Feature: A First Look at Windows Firewall News: Microsoft Promises IE Patch for Download.Ject Soon News: New MyDoom Worm Variant Affects Search Engines Too Special Report: Black Hat USA 2004 Briefings In Focus: Honeywall CD-ROM and Internet Storm CenterĢ. To make sure that your copy of Security UPDATE isn't mistakenly blocked by antispam software, add to your list of allowed senders and contacts.ġ. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |