Tag: firewall

Jun 14

Portspoof – About

Portspoof is meant to be a lightweight, fast, portable and secure addition to the any firewall system or security system. The general goal of the program is to make the reconessaince phase slow and bothersome for your attackers as much it is only possible. This is quite a change to the standard 5s Nmap scan, that will give a full view of your systems running services.

By using all of the above mentioned techniques together:

your attackers will have a tough time while trying to identify all of your listening services.

the only way to determine if a service is emulated is through a protocol probe (imagine probing protocols for 65k open ports!).

it takes more than 8 hours and 200MB of sent data in order to get all of the service banners for your system ( nmap -sV -p – equivalent).

via Portspoof – About.

Jul 12

Windows Security Downloads

Publisher: Malwarebytes
Version: | Platform: Windows | Category: Security Utilities | Total Downloads: 2,429 | Downloads last week: 1,238
Added on July 01, 2013
Malwarebytes Anti-Exploit BETA, formerly known as ExploitShield by ZeroVulnerabilityLabs, is a security program that protects you from zero-day exploits that target browser and application vulnerabilities. This program is meant to run alongside your traditional anti-virus or anti-malware products and provides extra protection against software and Windows vulnerabilities that are discovered, but do not have a patch available to fix them.

HitmanPro Logo
Publisher: SurfRight
Version: 3.7 | Platform: Windows | Category: Anti-Virus | Total Downloads: 64,437 | Downloads last week: 4,939
Added on April 03, 2013
HitmanPro is an anti-virus program that describes itself as a second opinion scanner that should be used in conjunction with another anti-virus program that you may already have installed.  If malware slips past your anti-virus software, HitmanPro will then step in to detect it.  Though SurfRite bills themselves as a second opinion scanner that does not mean that you cannot use the program as your primary anti-virus product. This is because its scanning technology not only incorporates its own virus definitions but also has the ability to scan files on your computer with the definitions of 5 other anti-virus vendors.

Shortcut Cleaner Logo
Publisher: BleepingComputer
Version: | Platform: Windows | Category: Security Utilities | Total Downloads: 26,566 | Downloads last week: 2,778
Added on June 11, 2013
Shortcut Cleaner is a utility that will scan your computer for Windows shortcuts that have been hijacked by unwanted or malicious software.  When Shortcut Cleaner finds bad shortcuts, it will automatically clean them so that they do not open unwanted programs.

Malwarebytes Anti-Rootkit Logo
Publisher: Malwarebytes
Version: | Platform: Windows | Category: Rootkit Scanner | Total Downloads: 90,574 | Downloads last week: 2,361
Added on March 21, 2013
Malwarebytes Anti-Rootkit is a free program that can be used to search for and remove rootkits from your computer.  When started, Malwarebytes Anti-Rootkit will scan your computer and allow you to remove any rootkits that it finds.

Junkware Removal Tool Logo
Publisher: thisisu
Platform: Windows | Category: Security Utilities | Total Downloads: 133,715 | Downloads last week: 9,822
Added on December 14, 2012
Junkware Removal Tool is a security utility that searches for and removes common adware, toolbars, and potentially unwanted programs (PUPs) from your computer.  A common tactics among freeware publishers is to offer their products for free, but bundle them with PUPs in order to earn revenue.  This tool will help you remove these types of programs.

AdwCleaner Logo
Publisher: Xplode
Platform: Windows | Category: Security Utilities | Total Downloads: 1,516,212 | Downloads last week: 88,061
Added on July 11, 2013
AdwCleaner is a program that searches for and deletes Adware, Toolbars, Potentially Unwanted Programs (PUP), and browser Hijackers from your computer.  By using AdwCleaner you can easily remove many of these types of programs for a better user experience on your computer and while browsing the web.

SecurityCheck Logo
Publisher: screen317
Platform: Windows | Category: Security Utilities | Total Downloads: 13,139 | Downloads last week: 419
Added on January 16, 2013
SecurityCheck is a program that searches for installed and running security programs on a user’s program. After it is finished, SecurityCheck will then display a log file that contains information about the security programs found on your computer and the status of security services such as Windows Firewall.

RogueKiller Logo
Publisher: Tigzy
Platform: Windows | Category: Security Utilities | Total Downloads: 122,826 | Downloads last week: 6,088
Added on October 01, 2012
RogueKiller is a security tool that can be used to terminate and remove malicious processes and programs from your computer.  RogueKiller has the ability to remove infections such as ZeroAccess, TDSS, rogue anti-spyware programs, and Ransomwares.

SUPERAntiSpyware Logo
Publisher: SUPERAntiSpyware
Platform: Windows | Category: Anti-Spyware | Total Downloads: 30,704 | Downloads last week: 815
Added on September 27, 2012
SUPERAntiSpyware is a free anti-spyware program that offers excellent detections and quick removal of common infections. As malware is constantly evolving and new variants are released, there is not one particular security program that will be able to protect you from all threats.  Therefore it is important to have a variety of programs in your security toolbox that you can use to scan your computer for malware and aid you in their removal.  SUPERAntiSpyware is definitely one of the programs that you want to have at your disposal.

Secunia PSI Logo
Publisher: Secunia
Version: 3.0 | Platform: Windows | Category: Monitoring Software | Total Downloads: 17,859 | Downloads last week: 309
Added on August 07, 2012
Secunia PSI is a tool that can be used to monitor your installed applications for new updates.  When started, Secunia PSI will scan your computer for applications and install any updates that are available for them. This allows your computer to remain secure from possible vulnerabilities in your installed programs.
Publisher: Emsisoft
Platform: Windows | Category: Security Utilities | Total Downloads: 11,833 | Downloads last week: 178
Added on August 24, 2012
BlitzBlank is an advanced system administration tool that allows you to disable drivers, delete files, folders, Windows Registry keys and values that are in-use or locked by malware. BlitzBlank also includes the ability to create scripts for removing multiple files, folders, and Registry information at once in order to avoid malware recreating the files and locking them again. This tool should only be used by advanced system administrators and IT professionals due to its ability to delete almost any file or folder.

Emsisoft Emergency Kit Logo
Publisher: Emsisoft
Platform: Windows | Category: Anti-Virus | Total Downloads: 115,794 | Downloads last week: 718
Added on January 27, 2013
Emsisoft Emergency Kit is a collection of standalone security programs and scanners that can be run from a USB key, bootable CD/DVD, or from within Windows Safe Mode without having to download and install a full security product.  This program is very useful for infections, such as Ransomware,  that cannot be removed while the infections are active or while logged into Windows.

OTL Logo


Publisher: OldTimer
Platform: Windows | Category: Security Utilities | Total Downloads: 30,667 | Downloads last week: 625
Added on July 24, 2012
OTL, or OldTimer ListIt, is a tool that is used to diagnose a computer for a possible malware presence and to provide system diagnostics information that can by someone working on a computer.  When run, OTL will scan your computer for a variety of information and then generate a report with a tremendous amount of information about your computer’s hardware, programs, files, and running environment.

HijackThis Logo
Publisher: Trend Micro
Version: 2.0.4 | Platform: Windows | Category: Security Utilities | Total Downloads: 112,015 | Downloads last week: 1,991
Added on August 24, 2012
HijackThis is a program that can be used to quickly spot home page hijackers and startup programs that you do not want to start automatically. This program is a not anti-virus program, but rather a enumerator that lists programs that are starting up automatically on your computer as well as other configuration information that is commonly hijacked.

Hosts-perm.bat Logo
Publisher: BleepingComputer
Platform: Windows | Category: Security Utilities | Total Downloads: 12,752 | Downloads last week: 227
Added on June 02, 2012
Hosts-perm.bat is a batch file that will reset the permissions for the Windows HOSTS file.  In the event that you attempt to delete or modify the HOSTS file and receive a message stating that you do not have permission, you can use the Hosts-perm.bat to reset the permissions so that you can properly access it.

ListParts Logo
Publisher: Farbar
Platform: Windows | Category: Security Utilities | Total Downloads: 13,638 | Downloads last week: 206
Added on June 13, 2012
ListParts is a small utility that will create a log that contains a listing of all the hard drive partitions on your computer, which can then be posted on the forum that you are receiving help.  This tool is useful for diagnosing rootkit infections that create additional hidden partitions on your computer.

VT Hash Check Logo
Publisher: Andrew Lambert
Version: 1.3 | Platform: Windows | Category: Security Utilities | Total Downloads: 3,365 | Downloads last week: 45
Added on May 09, 2013
VT Hash check adds a context menu item for all files allowing you to quickly search VirusTotal.com for matching files and their corresponding malware reports.

GrantPerms Logo
Publisher: Farbar
Platform: Windows | Category: Security Utilities | Total Downloads: 13,037 | Downloads last week: 234
Added on May 30, 2012
GrantPerms is a small portable tool that can be used to check permissions or unlock multiple files and folders. It is useful in cases where malware locks security files and system files and prevent them from running even after the malware is removed.

MiniToolBox Logo
Publisher: Farbar
Platform: Windows | Category: Security Utilities | Total Downloads: 59,263 | Downloads last week: 1,331
Added on June 26, 2012
MiniToolBox detects Internet connection issues due to broken or hijacked LSP, proxy settings, and problems with network adapters. It can also be used to detecte search redirections and router hijackings.

Farbar Recovery Scan Tool Logo
Publisher: Farbar
Platform: Windows | Category: Security Utilities | Total Downloads: 143,221 | Downloads last week: 4,139
Added on April 22, 2013
Farbar Recovery Scan Tool, or FRST, is a portable application designed to run on Windows XP, Windows Vista, Windows 7 and Windows 8 in normal or safe mode to diagnose malware issues.
Farbar Service Scanner Logo
Publisher: Farbar
Platform: Windows | Category: Security Utilities | Total Downloads: 85,921 | Downloads last week: 1,770
Added on July 02, 2013
Farbar Service Scanner allows you to diagnose network connectivity issues due to corrupted or missing Windows services.

ComboFix Logo
Publisher: sUBs
Version: | Platform: Windows | Category: Anti-Virus | Total Downloads: 10,507,380 | Downloads last week: 155,855
Added on January 29, 2013
ComboFix is a program, created by sUBs, that scans your computer for known malware, and when found, attempts to clean these infections automatically. In addition to being able to remove a large amount of the most common and current malware, ComboFix also displays a report that can be used by trained helpers to remove malware that is not automatically removed by the program.

Vba32 AntiRootkit Logo
Publisher: VirusBlockAda
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 11,231 | Downloads last week: 162
Added on May 21, 2012
Vba32 AntiRootkit is an advanced Rootkit scanner from VirusBlockAda.  This free scanner will search for kernel-mode rootkits, suspicious autoruns, and hidden processes.  VBA AntiRootkit is an advanced tool as it does not perform an automatic scan and removal.  Instead it displays any possible issues, which you will then have to decide how to act upon.

McAfee Labs Rootkit Remover Logo
Publisher: McAfee Labs
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 9,051 | Downloads last week: 165
Added on May 21, 2012
McAfee Labs Rootkit Remover is a free stand-alone product that scans your computer for Rootkits and attempts to remove them.  This version of Rootkit Remover is limited as it only detected and removes the ZeroAccess and TDSS family of rootkits.

Panda Anti-Rootkit Logo
Publisher: Panda Security
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 8,489 | Downloads last week: 152
Added on May 20, 2012
Panda Anti-Rootkit is a free rootkit scanner from Panda Security. This program will scan your computer for Rootkits and attempt to remove them.

Sophos Virus Removal Tool Logo
Publisher: Sophos
Platform: Windows | Category: Anti-Virus | Total Downloads: 12,383 | Downloads last week: 194
Added on May 20, 2012
The Sophos Virus Removal Tool is a stand-alone program that allows you to perform a quick scan of your computer for computer viruses.  If any infections are found it will attempt to remove them for free. As this program only scans your computer and remove any infections it finds, it can be used even if you have another anti-virus product installed.

Trend Micro RootkitBuster Logo
Publisher: Trend Micro
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 16,200 | Downloads last week: 289
Added on June 03, 2013
Trend Micro RootkitBuster is a program that will scan your computer for Rootkits.  This scanner will scan for rootkits that are using the latest technology including Master Boot Record (MBR) infections.

RootRepeal Logo
Publisher: ad13
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 7,693 | Downloads last week: 123
Added on May 19, 2012
RootRepeal is a rootkit scanner thatRootRepeal is a rootkit scanner that scans for kernel-mode drivers, whether they are hidden, or if the driver file is hidden on disk.  It also has the ability to look for hidden files, hidden process, SSDT hooks, hidden services, and stealth objects.

RootkitRevealer Logo
Publisher: Microsoft
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 7,116 | Downloads last week: 111
Added on May 19, 2012
RootkitRevealer is a rootkit scanner from Microsoft Sysinternals.  This program will search for user-mode or kernel-mode rootkits and list any API discrepancies that are found.

FixExec Logo
Publisher: BleepingComputer
Platform: Windows | Category: Security Utilities | Total Downloads: 125,414 | Downloads last week: 801
Added on August 24, 2012
FixExec is a program that is designed to fix executable file associations for the .bat, .exe, and .com file extensions. If the program detects any of these associations are missing, changed, or hijacked, the settings will be set back to the original Windows defaults. When file associations for batch, executable, or COM files are changed it could cause your executables to no longer start. If you are looking for FixNCR.reg, this file replaces FixNCR with greater functionality.
RKill Logo
Publisher: BleepingComputer
Version: | Platform: Windows | Category: Security Utilities | Total Downloads: 1,961,881 | Downloads last week: 37,963
Added on June 03, 2013
RKill is a program that was developed at BleepingComputer.com that attempts to terminate known malware processes so that your normal security software can then run and clean your computer of infections. When RKill runs it will kill malware processes and then removes incorrect executable associations and fixes policies that stop us from using certain tools. When finished it will display a log file that shows the processes that were terminated while the program was running.

Unhide Logo
Publisher: BleepingComputer
Version: | Platform: Windows | Category: Security Utilities | Total Downloads: 343,891 | Downloads last week: 1,568
Added on November 24, 2012
Unhide is a program that reverts back the changes made to your files and Windows Registry by the rogue.FakeHDD family of rogue anti-spyware program. This family of malware pretends to be a hard disk repair and system optimization program for Windows. In reality, though, these programs are computer infections that deliberately hide your files and change certain settings in the Windows Registry to make it appear that you have lost data on your hard drive. It will then prompt you to purchase the program to restore the data.

Defogger Logo
Publisher: jpshortstuff
Platform: Windows | Category: Security Utilities | Total Downloads: 20,737 | Downloads last week: 244
Added on May 17, 2012

If you have a CD or DVD emulation software installed, it may make it harder to get accurate scan results when you scan your computer with a anti-rootkit scanner. Due to this it is wise to first disable these emulation programs before scanning your computer so that the scan results are more accurate.

Malwarebytes Anti-Malware Logo
Publisher: Malwarebytes
Version: | Platform: Windows | Category: Anti-Spyware | Total Downloads: 1,718,986 | Downloads last week: 28,996
Added on April 10, 2013
Malwarebytes is a light-weight anti-malware program that is excellent at removing the latest detections.  This program is recommended as a support product for your normal anti-virus program.

TDSSKiller Logo
Publisher: Kaspersky Lab
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 715,665 | Downloads last week: 20,728
Added on August 24, 2012
TDSSKiller is a utility created by Kaspersky Labs that is designed to remove the TDSS rootkit. This rootkit is know under other names such as Rootkit.Win32.TDSS, Tidserv, TDSServ, and Alureon. TDSSKiller will also attempt to remove other rootkits such as the ZeroAccess or ZeroAccess rootkit if it is detected.

Publisher: GMER
Version: 2.1 | Platform: Windows | Category: Rootkit Scanner | Total Downloads: 22,389 | Downloads last week: 333
Added on April 19, 2013
GMER is a anti-rootkit scanner that searchs your computer for Rootkits on your computer and then allows you to attempt to remove them.

aswMBR Logo
Publisher: AVAST Software
Platform: Windows | Category: Rootkit Scanner | Total Downloads: 50,931 | Downloads last week: 840
Added on August 24, 2012
aswMBR is a anti-rootkit scanner that searchs your computer for Rootkits that infect the Master Boot Record, or MBR, of your computer. This includes the TDL4/3, MBRoot (Sinowal), and Whistler rootkits. For this program to properly work it must first download the Avast virus definitions, so you will need an active Internet connection before using it.


Windows Security Downloads.

Apr 30

Free firewall configuration search tool

Free firewall configuration search tool.

Apr 12

At Last, a Firewall for Your Car’s Black Box | Autopia | Wired.com

At Last, a Firewall for Your Car's Black Box | Autopia | Wired.com.

Feb 01

Seventh International Workshop on Secure Software Engineering (SecSE 2013)

Seventh International Workshop on Secure Software Engineering (SecSE 2013)

Regensburg, Germany, September 3, 2013
In conjunction with ARES 2013

Call for Papers

Software is about protecting information and ensuring that systems continue to
function correctly even when under malicious attack. The traditional approach
of securing a system has been to create defensive walls such as intrusion
detection systems and firewalls around it, but there are always cracks in
these walls, and thus such measures are no longer sufficient by themselves. We
need to be able to build better, more robust and more “inherently” secure
systems, and we should strive to achieve these qualities in all software
systems, not just in the ones that “obviously” need special protection.

This workshop will focus on techniques, experiences and lessons learned for
engineering secure and dependable software.

Suggested topics include, but are not limited to:
– Secure architecture and design
– Security in agile software development
– Aspect-oriented software development for secure software
– Security requirements
– Risk management in software projects
– Secure implementation
– Secure deployment
– Testing for security
– Quantitative measurement of security properties
– Static and dynamic analysis for security
– Verification and assurance techniques for security properties
– Security and usability
– Design and deployment of secure services
– Secure composition and adaptation of services
– Teaching secure software development
– Lessons learned
– Experience reports on successfully attuning developers to secure software

Important Dates
– March 30, 2013: Submission Deadline
– May 7, 2013: Author Notification
– June 1, 2013: Camera Ready and Author Registration
– September 3, 2013: Workshop

Submission Guidelines
Papers have a page limit of 10 pages and must adhere to the CPS Proceedings
Manuscripts style (two columns, single-spaced, including figures and references,
using 10 pt fonts, and number each page). Please consult the CPS Author
Guidelines (http://www.computer.org/portal/web/cscps/formatting) for more

Journal Special Issue
Distinguished papers submitted to SecSE will be invited to submit revised and
extended versions for publication in the International Journal of Secure
Software Engineering (ISSN 1947-3036).

Workshop Chairs
– Martin Gilje Jaatun, SINTEF ICT, Norway
– Lillian Røstad, Norwegian University of Science and Technology (NTNU), Norway
– Riccardo Scandariato, KU Leuven, Belgium

Jan 31

The 2013 International Conference on Security and Management – SAM’13


Paper Submission Deadline: March 18, 2013

The 2013 International Conference on Security and Management

July 22-25, 2013, Las Vegas, USA


You are invited to submit a full paper for consideration. All accepted
papers will be published in printed conference books/proceedings (ISBN)
and will also be made available online. The proceedings will be indexed
in science citation databases that track citation frequency/data for
each paper. In addition, like prior years, extended versions of selected
papers (about 35%) will appear in journals and edited research books
(publishers include: Springer, Elsevier, BMC, and others). SAM’13
is composed of a number of tracks, including: tutorials, sessions,
workshops, posters, and panel discussions. The conference will be held
July 22-25, 2013, Las Vegas, USA.

SCOPE: Topics of interest include, but are not limited to, the following:

O Network Security
-Security Algorithms
-Mobile Network Security
-Security in CDN (Contents Distribution Networks)
-Virtual Private Network (VPN)
-Tracing Techniques in Internet
-Active Networks
-Security in Grid
-Web Monitoring
-Network Security Engineering
-Transport-Level Security
-Wireless Network Security
-IP Security
-Electronic Mail security

O Cryptographic Technologies
-Security Protocols
-Key Management Techniques
-Cryptographic Technologies
-Applications of Block and Stream Ciphers
-Applications of Public Key Cryptology
-Message Authentication and Hash Functions
-Digital Signature Schemes
-Secret Sharing

O Security Management
-Surveillance Technologies
-Security Policies
-Security for Protocol Management
-Location Management
-QoS Management
-Resource Management
-Channel Management
-Mobility Management
-Digital Contents Copyright Protection
-System Security Management
-Network Security Management
-Management in Network Equipment
-Storage Area Networks (SAN) Management
-Information Security Management
-Government Security Policy
-Web Penetration Testing
-Security Operations
-Vulnerabilities Management

O Security Education
-Computer Security Education
-Network Security Education
-Cyber Security Education
-Cyber Security Body of Knowledge
-Information Assurance Education

O Information Assurance
-Mission Assurance
-Risk Assessment and Risk Management
-Continuity of Operations and Business Impact Analysis
-Cyber Security Compliance
-Security Auditing
-Security-Savvy Software Development
-Disaster Recovery
-Business Continuity Analysis
-Access Control
-Secure Use of Software
-Secure Performance

O Biometrics and Forensics
-Novel Biometric Methods
-Biological Security Technologies
-Face Recognition Systems
-Signature Recognition Systems
-Cyber Forensics
-Forensic Analysis
-Biometric Technologies for Security
-Feature Extraction and Matching Algorithms

O Hardware Security
-Embedded Systems Security
-Cryptographic Processors and Co-Processors
-Security Architectures
-True and Pseudorandom Number Generators
-Side Channel Attacks
-Fault Attacks
-Hardware Tamper Resistance
-Smart Card Processors
-Secure Storage Devices

O Security Applications
-Security in E-Commerce and M-Commerce
-Secure OS
-High-Tech Systems at Airports
-Emerging Technologies and Applications
-Cloud Computing Security
-Database Security
-Data Mining Security
-Cyber Security Automation

O Computer Security
-Firewall Systems
-Hacking Techniques and Related Issues
-Intrusion Detection System (IDS)
-Virus Issues (Detection, Prevention …)
-Trusted Computing
-Alert Correlation
-Attack Graphs
-Incident Responding
-Malware Analysis
-Incident Responding


January 31, 2013: Workshop / Session Proposals
March 18, 2013: Submission of full papers (about 7 pages)
April 18, 2013: Notification of acceptance (+/- two days)
May 5, 2013: Final papers + Copyright + Registration
July 22-25, 2013: The 2013 International Conference on Security
and Management (SAM’13)


Currently being prepared – The Academic Sponsors of the last offering of
FECS (2012) included research labs and centers affiliated with:
Minnesota Supercomputing Institute, USA; Argonne National Laboratory,
Illinois, USA; George Mason University, Virginia, USA; Harvard University,
Cambridge, Massachusetts, USA; Center for Cyber Defense, NCAT, North
Carolina, USA; Center for Advanced Studies in Identity Sciences (CASIS:
NC A&T, Carnegie Mellon, Clemson, UNC Wilmington), USA; Massachusetts
Institute of Technology (MIT), Cambridge, Massachusetts, USA; Texas A&M
University, USA; UMIT, Institute of Bioinformatics and Translational
Research, Austria; University of Iowa, USA; Russian Academy of Sciences,
Moscow, Russia; NDSU-CIIT Green Computing and Communications Laboratory,
USA; Medical Image HPC and Informatics Lab, Iowa, USA; and others.
Sponsors At-Large included (corporate, associations, organizations):
Intel Corporation; Super Micro Computer, Inc., California, USA; Altera
Corporation; The International Council on Medical and Care Compunetics;
International Society of Intelligent Biological Medicine; US Chapter of
World Academy of Science; High Performance Computing for Nanotechnology;
Luna Innovations; World Academy of Biomedical Sciences and Technologies;
Manx Telecom; Computer Science Research, Education, and Applications
Press; HoIP Telecom; Hodges Health; Leading Knowledge; OMG; Science
Publications and others.


Prospective authors are invited to submit their papers by uploading them
to the evaluation web site at:
( OR http://world-comp.org ).
Submissions must be uploaded by March 18, 2013 and must be in either
MS doc or pdf formats (about 7 pages including all figures, tables,
and references – single space, font size of 10 to 12). All reasonable
typesetting formats are acceptable (later, the authors of accepted
papers will be asked to follow a particular typesetting format to
prepare their final papers for publication.) Papers must not have been
previously published or currently submitted for publication elsewhere.
The first page of the paper should include: title of the paper, name,
affiliation, postal address, and email address for each author. The
first page should also identify the name of the Contact Author and a
maximum of 5 topical keywords that would best represent the content
of the paper. The track title must also be stated on the first page of the
paper as well as a 100 to 150-word abstract. The length of the final/
Camera-Ready papers (if accepted) will be limited to 7
(two-column IEEE style) pages.

Each paper will be peer-reviewed by two experts in the field for
originality, significance, clarity, impact, and soundness. In cases of
contradictory recommendations, a member of the conference program
committee would be charged to make the final decision (accept/reject);
often, this would involve seeking help from additional referees.
Papers whose authors include a member of the conference program
committee will be evaluated using the double-blinded review process.
(Essay/philosophical papers will not be refereed but may be considered
for discussion/panels).

The proceedings will be published in printed conference books (ISBN) and
will also be made available online. The proceedings will be indexed in
science citation databases that track citation frequency/data for each
published paper. Science citation databases include: Inspec / IET / The
Institute for Engineering & Technology; The French National Center for
Scientific Research, CNRS, INIST databases, PASCAL (accessable from
INIST, Datastar, Dialog, EBSCO, OVID, Questel.Orbit, Qwam, and STN
International); P3P8PCTD70148 and others. Though, there is no guarantee
that the proceedings will also be included in SCI EI Compendex/Elsevier
indexings; in the past, the proceedings were included in these databases.
Therefore, we will also be sending the proceedings for indexing
procedures to SCI EI Compendex/Elsevier. The printed proceedings/books
will be available for distribution on site at the conference.


Poster papers can be 2 pages long. Authors are to follow the same
instructions that appear above (see, SUBMISSION OF REGULAR PAPERS) except
for the submission is limited to 2 pages. On the first page, the author
should state that “This paper is being submitted as a poster”. Poster
papers (if accepted) will be published if and only the author of the
accepted paper wishes to do so. please email your poster papers to the
poster co-chairs: Hanen Idoudi ( Hanen.Idoudi@ensi.rnu.tn ), or
Esmiralda Moradian ( moradian@kth.se ).


Each conference is composed of a number of tracks. A track can be a
session, a workshop, or a symposium. A session will have at least 6
papers; a workshop at least 12 papers; and a symposium at least 18
papers. Track chairs will be responsible for all aspects of their
tracks, including: soliciting papers, reviewing, selecting, …
The names of track chairs will appear as Associate Editors in the
conference proceedings and on the cover of the printed books (and
indexed in science databases as such).

Proposals to organize tracks (sessions, workshops, or symposiums) should
include the following information: name and address (+ email) of proposer,
his/her biography, title of track, a 100-word description of the topic of
the track, the name of the conference the track is submitted for
consideration (ie, SAM), and a short description on how the track
will be advertised (in most cases, track proposers solicit papers from
colleagues and researchers whose work is known to the track proposer).
E-mail your track proposal to the Workshops/Sessions co-chairs:
Flaminia Luccio ( luccio@unive.it ) or Sergey Morozov
( morozose@udmercy.edu ). We would like to receive the track proposals
as soon as possible but by no later than January 31, 2013.


Currently being finalized. The members of the Steering Committee of The
2012 Congress that FECS was (and will be) part of included: Dr. Selim
Aissi, (formerly: Chief Strategist – Security, Intel Corporation, USA)
Senior Business Leader & Chief Architect, Visa Corporation, USA; Prof.
Babak Akhgar, PhD, FBCS, CITP, Professor of Informatics, Sheffield
Hallam University, Sheffield, UK; Prof. Hamid R. Arabnia, Professor of
Computer Science, Elected Fellow of ISIBM, Editor-in-Chief of Journal
of Supercomputing (Springer), University of Georgia, USA; Prof. Kevin
Daimi, Professor of Computer Science, Director of Computer Science and
Software Engineering Programs, Department of Mathematics, Computer
Science and Software Engineering, University of Detroit Mercy, Detroit,
Michigan, USA; Prof. Gerry Vernon Dozier, Professor of Computer Science,
Chair of Department of Computer Science and Director of Center for
Advanced Studies in Identity Sciences, Center for Cyber Defense, North
Carolina A&T State University, North Carolina, USA; Dr. Michael R.
Grimaila, Associate Professor, Air Force Institute of Technology,
Systems Engineering, Fellow of ISSA, CISM, CISSP, IAM/IEM, Editorial
Board of ISSA Journal, Air Force Center of Cyberspace Research, Advisor
to the Prince of Wales Fellows & Prince Edward Fellows at MIT and
Harvard Universities and PC member of NATO Cooperative Cyber Defence
Centre of Excellence (CCD COE); Prof. Kun Chang Lee, Professor of MIS
and WCU Professor of Creativity Science, Business School and Department
of Interaction Science, Sungkyunkwan University, Seoul, South Korea;
Prof., Dr., Dr.h. Victor Malyshkin, Head of Supercomputer Software
Department (SSD), Institute of Computational Mathematics and
Mathematical Geophysics, Russian Academy of Sciences, Russia;
Prof. George Markowsky, Professor and Chair of Computer Science,
Associate Director of School of Computing and Information Science,
Chair of International Advisory Board of IEEE IDAACS and Director 2013
Northeast Collegiate Cyber Defense Competition, Chair Bangor Foreign
Policy Forum, Cooperating Professor of Mathematics & Statistics
Department UMaine, Cooperating Professor of School of Policy &
International Affairs UMaine, University of Maine, Orono, Maine, USA;
Prof. Andy Marsh, Director of HoIP, Director of HoIP Telecom, UK,
Secretary-General of WABT, Vice- president of ICET, Visiting Professor,
University of Westminster, UK; Prof. James J. (Jong Hyuk) Park,
Professor of Computer Science and Engineering, Seoul National
University of Science and Technology (SeoulTech), Korea, President of
KITCS, Presidentof FTRA, Editor-in-Chiefs of HCIS, JoC and IJITCC
Journals; Ashu M. G. Solo (Publicity Chair), Fellow of British
Computer Society, Principal R&D Engineer, Maverick Technologies
America; Prof. Sang C. Suh, Head and Professor of Computer Science,
Vice President, of Society for Design and Process Science (SDPS),
Director of Intelligent Cyberspace Engineering Lab (ICEL), Texas A&M
University, Com., Texas, USA; Prof. Layne T. Watson, IEEE Fellow,
NIA Fellow, ISIBM Fellow, Fellow of The National Institute of
Aerospace, Virginia Polytechnic Institute & State University,
Virginia, USA

The 2013 Program Committee for SAM conference is currently being
compiled. Many who have already joined the committees are renowned
leaders, scholars, researchers, scientists and practitioners of the
highest ranks; many are directors of research labs., fellows of
various societies, heads/chairs of departments, program directors of
research funding agencies, as well as deans and provosts.

Program Committee members are expected to have established a strong and
documented research track record. Those interested in joining the
Program Committee should email daimikj@udmercy.edu
the following information for consideration/evaluation: Name,
affiliation and position, complete mailing address, email address,
a one-page biography that includes research expertise, and details of
two recent papers on security.


SAM is an international conference that serves researchers, scholars,
professionals, students, and academicians who are looking to both foster
working relationships and gain access to the latest research results.
It is being held jointly (same location and dates) with a number of
other research conferences; namely, The 2013 World Congress in Computer
Science, Computer Engineering, and Applied Computing (WORLDCOMP). The
Congress is the largest annual gathering of researchers in computer
science, computer engineering and applied computing. We anticipate to
have 2,100 or more attendees from over 85 countries.

The 2013 Congress will be composed of research presentations, keynote
lectures, invited presentations, tutorials, panel discussions, and
poster presentations. In recent past, keynote/tutorial/panel speakers
have included: Prof. David A. Patterson (pioneer, architecture, U. of
California, Berkeley), Dr. K. Eric Drexler (known as Father of
Nanotechnology), Prof. John H. Holland (known as Father of Genetic
Algorithms; U. of Michigan), Prof. Ian Foster (known as Father of Grid
Computing; U. of Chicago & ANL), Prof. Ruzena Bajcsy (pioneer, VR, U.
of California, Berkeley), Prof. Barry Vercoe (Founding member of MIT
Media Lab, MIT), Dr. Jim Gettys (known as X-man, developer of X Window
System, xhost; OLPC), Prof. John Koza (known as Father of Genetic
Programming, Stanford U.), Prof. Brian D. Athey (NIH Program Director,
U. of Michigan), Prof. Viktor K. Prasanna (pioneer, U. of Southern
California), Dr. Jose L. Munoz (NSF Program Director and Consultant),
Prof. Jun Liu (pioneer, Broad Institute of MIT & Harvard U.),
Prof. Lotfi A. Zadeh (Father of Fuzzy Logic), Dr. Firouz Naderi (Head,
NASA Mars Exploration Program/2000-2005 and Associate Director, Project
Formulation & Strategy, Jet Propulsion Lab, CalTech/NASA; Director,
NASA’s JPL Solar System Exploration), Prof. David Lorge Parnas (Fellow
of IEEE, ACM, RSC, CAE, GI; Dr.h.c.: ETH Zurich, Prof. Emeritus,
McMaster U. and U. of Limerick), Prof. Eugene H. Spafford (Executive
Director, CERIAS and Professor, Purdue University), Dr. Sandeep
Chatterjee (Vice President & Chief Technology Officer, SourceTrace
Systems, Inc.), Prof. Haym Hirsh (Rutgers University, New Jersey, USA
and former director of Division of Information and Intelligent Systems,
National Science Foundation, USA), Dr. Flavio Villanustre (Vice-
President, HPCC Systems), and many other distinguished speakers. To
get a feeling about the Congress’s atmosphere, see the 2012 delegates
photos available at: http://infinitydempsey.smugmug.com/WorldComp

An important mission of the Congress is “Providing a unique platform for
a diverse community of constituents composed of scholars, researchers,
developers, educators, and practitioners. The Congress makes concerted
effort to reach out to participants affiliated with diverse entities
(such as: universities, institutions, corporations, government agencies,
and research centers/labs) from all over the world. The Congress also
attempts to connect participants from institutions that have teaching as
their main mission with those who are affiliated with institutions that
have research as their main mission. The Congress uses a quota system to
achieve its institution and geography diversity objectives.”

One main goal of the Congress is to assemble a spectrum of affiliated
research conferences, workshops, and symposiums into a coordinated
research meeting held in a common place at a common time. This model
facilitates communication among researchers in different fields of
computer science, computer engineering, and applied computing. The
Congress also encourages multi-disciplinary and inter-disciplinary
research initiatives; ie, facilitating increased opportunities for
cross-fertilization across sub-disciplines.


As of December 2012, papers published in the Congress proceedings have
received over 27,000 citations (includes about 2,000 self-citations).
Citation data obtained from http://academic.research.microsoft.com/ .


Inquiries should be sent to: daimikj@udmercy.edu


Jan 07

Practical IT: are your firewalls in the wrong place? | Naked Security

Practical IT: are your firewalls in the wrong place? | Naked Security.

Aug 23

Debian : APF Firewall, Brute Force Detection et DDoS Deflate

Debian : APF Firewall, Brute Force Detection et DDoS Deflate.

Jun 24

Net-Peeker – monitorer le réseau et Firewall | malekal’s site

Net-Peeker – monitorer le réseau et Firewall | malekal’s site.

Jun 23

ModSecurity for apache | SourceForge.net

ModSecurity is a web application firewall that can work either embedded or as a reverse proxy. It provides protection from a range of attacks against web applications and allows for HTTP traffic monitoring, logging and real-time analysis.

via ModSecurity | Free System Administration software downloads at SourceForge.net.