Publications
by Howard Fuhs
Standard Malware Removal Process (Flowchart Graphic) - 08/2011 ![]()
PCI Standards - what are they good for in the light of the PSN hack? - 04/2011 ![]()
Satellite Monitoring, Satellite Hacking
and Satellite Security - Lecture Papers ![]()
A Short Primer on Mil Sat Coms - 08/2003 ![]()
Telecomms Security - Doorman Wanted - 02/2003 ![]()
The Enemy In Your Own Camp - 12/2002![]()
Linux as the Network client: It does work... - 01/2000![]()
International Alphabets - 06/1999![]()
Internet Security Policies - 09/1998![]()
The Y2k Problem and Security Technology - 07/1998![]()
Trade Terms and Conditions - and Internet Access - 05/1998![]()
Modern Times - The Durability of Data- 02/1998 ![]()
Electronic Information Channels Used by Virus Programmers - 12/1997![]()
Remote Access Services - Open Doors for Crackers - 10/1997![]()
Dangerous Corporate Internet Use - Two Cases - 09/1997![]()
The Emperor's New Clothes (once more)
Antivirus-Problems under Windows 95 - 10/1996![]()
Risks in Wireless Network Technology - 05/1996![]()
Security Problems in Wide Area Networks - 05/1996![]()
Smart-card Security Aspects - 06/1995![]()
Encryption Generators Used in Computer Viruses - Part 1 - 05/1995![]()
Encryption Generators Used in Computer Viruses - Part 2 - 05/1995![]()
Preventive Measures against Computer Viruses - 02/1995![]()
Information Security Training for Users - 02/1995![]()
Virus Construction Kits - 08/1994![]()
Some Aspects of Virus Prevention - 08/1994![]()
Computer Viruses for Military Purposes - 08/1994![]()
Telecommunication Security - 07/1994![]()
First steps in case of a virus infection - 06/1994![]()