Last Updated on 23 July 2014, Total: 45 White Papers

  1. How to Audit the 5 Most Important Active Directory Changes

    Active Directory is the central identity store and authentication provider for most networks today making it hugely critical to security... Read More

  2. Passive Information Gathering (Part 2)

    Part 2 of what can be gathered passively in order to formulate a targeted attack... Read More

  3. Passive Information Gathering (Part 1)

    What can be gathered passively in order to formulate a targeted attack... Read More

  4. The need for effective event management

    Logs and their management are however one of the most important aspects in computer systems management. This white paper shows where GFI EventsManager fits in this picture and how it is an invaluable asset in the corporate toolbox... Read More

  5. Spreadsheet Assurance

    To date auditors have not looked too deeply into the content or accuracy of spreadsheets in corporations. With Sarbanes-Oxley (SOX), and the recent Health Insurance Portability & Accountability Act (HIPAA), you can bet that they will start to take a closer look. Will your spreadsheet results pass an audit?... Read More

  6. Analysis of Remote Active Operating System Fingerprinting Tools

    There are many tools today that are used for remote active operating system fingerprinting. They all have their own fingerprinting techniques. This paper gives an in-depth analysis of three such tools: Nmap, RINGv2, and Xprobe2. The purpose of the paper is to show how these tools work, and to understand the advantages and disadvantages they each offer... Read More

  7. Guide to Sybase Security

    This article provides a detailed explanation of security for a Sybase database. The article has been written from the perspective of both security auditing and implementation. The queries and details given have been tested on Sybase Adaptive Server Enterprise 12.5 but will be valid for other versions as well... Read More

  8. Hacking Web Applications Using Cookie Poisoning

  9. Ethical Hacking Techniques to Audit and Secure Web-enabled Applications

  10. Web Application Forensics: The Uncharted Territory

Featured Links