[G3]-Technews
[G3]-TechNews : Home| RSS | Atom | MSN | WAP

 Stickies:
Article: Step-by-Step Guide: How to set up a VPN
Article: Download: Microsoft Monad (Beta)
Article: Building a 64-Bit Multimedia Workstation
Article: Coming Soon to Windows: The Microsoft Shell (MSH)
Article: How to Reset Win NT / 2000 / XP Administrator Password
Article: The Technology Behind Dual Core CPUs
Article: How-To: Wireless Network Security
Article: Article: PCI Express - technology backgrounder
Article: Tutorial: Access Hidden Files on Your iPod
Article: Troubleshooting drivers with XP's hidden Driver Verifier Manager
Article: How to Make a 5 in 1 Network Cable
Article: Comparison - Blu-ray & HD DVD
Article: Beginners Guides Linux : Part 1 | Part 2 | Part 3
Article: How To Crack WEP (Wired Equivalent Privacy)
Article: Email Addresses Spoofing.
Link: Free PHP ebook
Link: FREE ASP.NET books and eLearning course
Link: Free registration code for Opera 8.
Invitations: Gazzag (Here) | Yahoo! 360 (Here)  | Orkut (Here)

Microsoft Researchers Target Worms, Buffer Overruns
Contributed by: G3nu1n3, at 3/04/2005 11:20:00 PM.

Microsoft researchers showed off some forward-looking technologies this week, including new ways to protect systems against Internet worms, prevent hacker attacks, and measure available bandwidth on home networks.

One of the technologies on display, dubbed Vigilante, proposes a detection and protection system for Internet worms. The system would consist of "honey pot" computers connected to the Internet that would serve as bait for the worms. Once an attack was detected, the computers would analyze the attack and create alerts that included details on how to protect against the new threat. The alerts then would be pushed out to other computers, which would automatically put up shields and filter traffic to block the worm, Microsoft researchers said.

Another forward-looking technology can prevent malicious code from executing. The system, called Control-Flow Integrity, would prevent malicious code from being run on a computer by checking application activity and validating it. Unexpected activity would be blocked, according to Microsoft.

Source: Link


Important:
To Read MOST UPDATED News Items browse to HOME page.

0 Comments:

Post a Comment

<< Home



[G3]-TechNews : Home| RSS | Atom | MSN | WAP


Archives :

- Monthly Archives :


- Post Count: 1,783 before June 1, 2005. (Since: October 26, 2004)