General security

Preparing for a successful IAM integration project (Part 2 of 2)

Iteration-Based Delivery[pkadzone zone="main_top"] As mentioned before, an identity management implementation project will often extend 18-36 months based o

Data Backups with Bacula: Notifications

Introduction When the backup solution is already working, we can also take a look at notifications more closely. We can send a notification email for every b

Data Backups with Bacula: Client Data Backup and Restoration

Introduction When configuring the Bacula client, we don't need the full-blown Bacula installation, but just the bacula-client package that we can simply inst

Data Backups with Bacula: Bacula Internals

Introduction This article presents the integral concepts of Bacula operation and management, which are integral parts of every Bacula backup solution and mus

Data Backups with Bacula: Creating the Storage Partition

Introduction In this endeavor I've chosen to use Bacula backup software for the reasons outlined above. First we must talk about the Bacula server, but the o

Cookies with Secure Flag: Undesired Behavior in Modern Browsers

Introduction When a cookie has secure flag set, it will only be sent over secure HTTPS, which is HTTP over SSL/TLS. This way, the authentication cookie will

Securing VoIP systems

Voice over Internet Protocol (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet

Shellcode Detection and Emulation with Libemu

Introduction Libemu is a library which can be used for x86 emulation and shellcode detection. Libemu can be used in IDS/IPS/Honeypot systems for emulating th

Crowdsensing: State of the Art and Privacy Aspects

1. Introduction It is estimated that today approximately three-quarters of the human population has a mobile phone. Crowdsensing, a new business model, allow

Explaining cyberterrorism

Introduction People feel endangered by cyberterrorists, and this topic has raised an alarm in many societies. Many experts in the IT field and many political