#Àüü±â»ç
#½ÃÅ¥¸®Æ¼¿ùµå
#»ç°Ç»ç°í
#º¸¾È¸®Æ÷Æ®
#¹ÌÅ佺 Ãæ°Ý
|
||||||
| Extranet Access Management(EAM) | ||||||
EAM °³¿ä ÅëÇÕÀÎÁõ, ±ÇÇѰü¸® ¼Ö·ç¼Ç EAM ÀÎÅͳÝ, ÀÎÆ®¶ó³Ý, C/S ȯ°æ¿¡¼ È¿°úÀûÀÎ ÅëÇÕÀÎÁõ(SSO) ȯ°æ°ú À̸¦ ±â¹ÝÀ¸·Î ÅëÇÕµÈ ±ÇÇѰü¸®(Access control)½Ã½ºÅÛÀ» ±¸ÃàÇϱâ À§ÇÑ Á¢±ÙÁ¦¾î ¼Ö·ç¼Ç E... |
||||||
| ¿ú(worm)ÀÇ ¹ø½Ä°ú ´ëÀÀÃ¥ | ||||||
¾Ç¼º ÄÚµå °³¿ä Á¦ÀÛÀÚ°¡ ÀǵµÀûÀ¸·Î »ç¿ëÀÚ¿¡°Ô ÇÇÇØ¸¦ ÁÖ°íÀÚ ¸¸µç ÇÁ·Î±×·¥, ¸ÅÅ©·Î, ½ºÅ©¸³Æ® µî ½ÇÇà °¡´ÉÇÑ ÇüÅ |
||||||
| ½Ã½ºÅÛ º¸¾È °úÁ¦ | ||||||
¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow)´Â ¶§¶§·Î ÇØÄ¿°¡ ½Ã½ºÅÛÀÇ Á¦¾î±ÇÀ» °¡Áú¼ö ÀÖ´Â º¸¾ÈÀÇ Ãë¾àÁ¡ÀÌ µÉ¼ö ÀÖ´Ù. National Institute of Standard and Technologies ¿¡ µû¸£... |
||||||
| Defeating Overflow Attacks | ||||||
¹öÆÛ ¿À¹öÇ÷οì(Buffer Overflow) ¹öÆÛ°¡ °¡Áö°í ÀÖ´Â ¹öÆÛ ¿µ¿ª¹Û¿¡ µ¥ÀÌÅͰ¡ ¾²¿©Áö°Ô µÉ¶§ ¹ß»ý ¹öÆÛ ¿µ¿ª ¹ÛÀÇ µ¥ÀÌÅͰ¡ ½Ã½ºÅÛÀÇ Áß¿ä ¿¹¾à ¿µ¿ªÀ» ħ¹üÇÔ ÀϹݻç¿ëÀÚ: Segmentation fault ... |
||||||
| Building a More Secure Network | ||||||
¾ÈÀüÇÏ°Ô °í¾ÈµÈ ³×Æ®¿öÅ© topography´Â °ø±ÞÀÚ¿Í °í°´ °ü¸®ÀÚ »çÀÌÀÇ °øÅëÀûÀÎ ÁÖÁ¦ÀÌ´Ù. ±×·¯³ª ¾ÈÀüÇÑ ³×Æ®¿öÅ© µðÀÚÀÎÀº ¸Å¿ì ºñ½Ñ Çϵå¿þ¾î¿Í ¼ÒÇÁÆ®¿þ¾î·Î ÀÌ·ç¾îÁö´Â ¾Ê´Â´Ù. ±×°ÍÀº ¸é¹ÐÇÑ Àü·«°ú ¹«·á·Î »ç¿ë... |
||||||
| SMB ±â¾÷ º¸¾È °¡À̵å | ||||||
ÀÎÅͳݰú ÃÖ±ÙÀÇ ¼¼°èÀû À̺¥Æ®·Î ÀÎÇØ ±â¾÷ÀÌ º¸¾È¿¡ Á¢±ÙÇÏ´Â ¹æ½ÄÀÌ ±Ùº»ÀûÀ¸·Î ¹Ù²î¾ú½À´Ï´Ù. ºÒ°ú 10³â Àü¸¸ ÇØµµ ³×Æ®¿öÅ© º¸È£´Â ¾î¶»°Ô ÇØ¼µç »ç¶÷µéÀÌ Á¢±ÙÇÏÁö ¸øÇϵµ·Ï ÇÏ´Â µ¥ ÁßÁ¡À» µÎ¾ú½À´Ï´Ù. ¿ÜºÎÀÎÀÌ ±â¾÷... |
||||||
| A guide for Small & Mid-sized Business | ||||||
º¸¾ÈÀÇ °³¿ä SMBÀÇ 30%ÀÌ»óÀÌ ¼¼»óÀÌ °³º®ÇÏÁö ¾Ê´Â ÇÑ °ø°Ý¹ÞÁö ¾ÊÀ» °ÍÀ¸·Î »ý°¢ ÇÏ´Â ÀÌÀ¯ Too small to be targeted Their data is not high-value intellectua... |
||||||
| ÀÎÅÍ³Ý °ø°ÝÀÇ ´ëÀÀ¹æ¹ý | ||||||
ÀûÀÇ ¸ðµç °ÍÀ» È®ÀÎÇØ º¸ÀÚ! ¡°Military action is important to the nation ? it is the ground of death and life, the path of survival ... |
||||||
| ¼º°øÀûÀÎ º¸¾È ÇÁ·Î±×·¥À» À§ÇÑ °³¿ä | ||||||
º¸¾È Á¤Ã¥ º¸¾È Á¤Ã¥Àº ¿Ö ÇÊ¿äÇѰ¡? º¸¾È ÇÁ·Î±×·¥ÀÇ ÇÙ½É È¸»çÀÇ ¾î´À ºÎºÐ¿¡¼ ¾î¶² º¸¾ÈÀÌ ÇÊ¿äÇÑÁö Á¤ÀÇ º¸¾È Á¤Ã¥°ú º¸¾È ÀýÂ÷ÀÇ Â÷ÀÌ Á¤Ã¥: °èÃþ ±¸Á¶·Î º¸¾ÒÀ» ¶§ ÃÖ»óÀ§¿¡ À§Ä¡. °£´Ü ¸í·áÇØ¾ßÇÔ. ÀýÂ÷: Á¤Ã¥ÀÌ... |
||||||
| ½ºÅ×°¡³ë±×¶óÇÇ (Steganography) | ||||||
What is the steganography? Definition To hide even the occurrence of messages. Often called ¡°stego¡±. Stegonography vs. C... |
||||||
1
Ãë¾àÁ¡ Áø´Ü µµ±¸ ¡®Nessus¡¯ÀÇ ¿ª½À.....
2
üũ¸·½º »ç³» µ¥ÀÌÅÍ ´ÙÅ©À¥ ³ëÃâ... 3¿ù...
3
[¹ÌÅ佺 Ãæ°Ý] ¡°Á¤ºÎ ´ëÃ¥ ¹º°¡?¡±... ...
4
LGÀ¯Ç÷¯½º ¡°¼Ò¹ö¸° SASE ¼ºñ½º ¿¬³» ...
5
¡°±¹°¡ ¾çÀÚº¸¾È R&D, PQC Àüȯ ÇÙ½É ...
RSS ¼ºñ½º|¡¸¿¸°º¸µµ¿øÄ¢¡¹ ´ç ¸Åü´Â µ¶ÀÚ¿Í ÃëÀç¿ø µî ´º½ºÀÌ¿ëÀÚÀÇ ±Ç¸® º¸ÀåÀ» À§ÇØ ¹Ý·ÐÀ̳ª Á¤Á¤º¸µµ, ÃßÈ帵µ¸¦ ¿äûÇÒ ¼ö Àִ â±¸¸¦ ¿¾îµÎ°í ÀÖÀ½À» ¾Ë·Áµå¸³´Ï´Ù.
°íÃæÃ³¸®ÀÎ ±ÇÁØ(kwonjun@boannews.com)