Defcon 10 Presentation: Lock-and-Key-DynamicAccessLists in PDF format
c1419e1fbe8df2f8f367d5f2384975f3c41e8d38fd1f1589756e9360bf50b050
Defcon 10 Presentation: MaintainingaCiscoUnitySystemwithMicrosoftExchangea in PDF format
cdecfd372f959169ebd67f5e492ad525a5b04fdeac2c6de9a9ebb7e1a2c27a22
Defcon 10 Presentation: MeasuringDelay,Jitter,andPacketLosswithCiscoIOSSAA in PDF format
cdf2d4b1765bef26098b13df28fe6fe1f88f1d587aa054daff27ab845500094f
Defcon 10 Presentation: MetroIPTechnology in PDF format
f112804ef1b12f492e02bd01c0c8ecbdb37fc085e5778d3e30f668901b366598
Defcon 10 Presentation: NetworkManagementSystem-BestPractices in PDF format
08033f00fe0c1c4508e95bfe5b530926007c4cb7645289ad33fbbbd12c647505
Defcon 10 Presentation: NetworkSecurityPolicy-BestPractices in PDF format
a40f764c0097b583f3cdc7519fa750a7cacde097b67d12f4dfac0fe064fd9be2
Defcon 10 Presentation: NetworkTimeProtocol-BestPractice in PDF format
73876ed987c0105e5cb133587b2f247936ed12ceea9812e9ba4ca09d41c88e1d
Defcon 10 Presentation: NewSolutionDeployment-BestPractices in PDF format
e074551ca9985088db99950fc99a3f3f30babb493a94047b56f8e1892b193de3
Defcon 10 Presentation: OSPFConfigurationManagementwithSNMP in PDF format
6358b182c5b3a81aed5a64d6ffcc8ee40b12b92ee93dd021b638d175451cdd74
Defcon 10 Presentation: PerformanceManagement-BestPractices in PDF format
c96fd47dddc31a54be2598b3f8e7c1446a5c43d49b4349a9862a771219862502
Defcon 10 Presentation: PPTPFrequentlyAskedQuestions in PDF format
09a19267c1d6e01b28dd82ad8c22cd97e28600b26f3965db0ae878247d091a6b
Defcon 10 Presentation: AnIntroductiontoIPSecurityIPSecEncryption in PDF format
147c93cb8221ab218333a809cc61edca41f9edadb1578a29b3799ff2598b05d5
Defcon 10 Presentation: BaselineProcess-BestPractices in PDF format
079b691e305e44de3003ba8cbc458e546a30e114f44cbf4c9cf2e064c069e69d
Defcon 10 Presentation: BenefitsandLimitationsofContext-BasedAccessControl in PDF format
cc18a8358cf00b73212f0bd04cfffb8496e47f019dc04741b313a3bf594111f5
Defcon 10 Presentation: BestPracticesforCatalyst4000,5000and6000SeriesSwit in PDF format
1bbbf17e806c681b12d8558c7aa5fdf92e67ab3a45206d077d0e66172de82646
Defcon 10 Presentation: BuildingaPerimeterSecuritySolution in PDF format
bb2716ee5d51114d5a0e859f5eef712fbfb129b94c564aba33a67ae70be7392f
Defcon 10 Presentation: CapacityandPerformanceManagement-BestPractices in PDF format
084ae3c1209f7b462dd64057c2c681cbf84eda553098cb7d51ceef30c7540645
Defcon 10 Presentation: ChangeManagement-BestPractices in PDF format
a22db3a1b594b5e8755f661d3c66fc2f55c666d1fc30b475e1209b53f23f5ecd
Defcon 10 Presentation: ChoosingandUpgradingSoftwareforCiscoIOSFirewall in PDF format
b71ff9f9d73268280678f6f792f4bf586c5bffec4886e20184a9639dda800ed9
Defcon 10 Presentation: CiscoExpressForwardingCEF in PDF format
e47fc4dbea8a4ce89f67f0a590a07af067683e962cf2ef7813e917d0c7d0d173
Defcon 10 Presentation: CiscoHardwareandVPNClientsSupportingIPSec-PPTP-L2TP in PDF format
278408ce6bcc4f7adb920295c24d5e4e960ae28ed045059eae649edf4eb237a1
Defcon 10 Presentation: CiscoIOSFirewallFeatureSetFrequentlyAskedQuestions in PDF format
0d94dc21af8928181cfa4e5199fb7bc1e69f77b249421f262e9abf4b86268f3f
Defcon 10 Presentation: CiscoIOSReferenceGuide in PDF format
5455108fb9910f3c3c885365f301ff9b0bb9a19f429c6ce9f3953f3847c148eb
Vulnerabilities in your code and Advanced Buffer Overflows - A paper by CoreSecurity that underlines some of the most common mistakes made by programmers, presented as ten examples. Paper shows the exact location of vulnerabilities in codes, providing detailed explanations and exploits for each one found.
2da40b28213106f046b4f864e56516a0c39e8fbc21d7fb37c7798ca6b2a2c5e8
FreeBSD Security Advisory FreeBSD-SA-02:41 - The sendmail Restricted Shell command (smrsh) contains errors in the handling of command arguments with "||" or spaces which allow the execution of commands outside of those in its target directory. Since command arguments may be specified in local users' .forward' files, the smrsh restrictions may be bypassed using such files that are specially crafted.
6f435e71ca899851ba23f0f5dac3c950a42b07a1bbd6700c4fab2e2199250a74