Publications
by Howard Fuhs
Standard Malware Removal Process (Flowchart Graphic) - 08/2011
PCI Standards - what are they good for in the light of the PSN hack? - 04/2011
Satellite Monitoring, Satellite Hacking
and Satellite Security - Lecture Papers
A Short Primer on Mil Sat Coms - 08/2003
Telecomms Security - Doorman Wanted - 02/2003
The Enemy In Your Own Camp - 12/2002
Linux as the Network client: It does work... - 01/2000
International Alphabets - 06/1999
Internet Security Policies - 09/1998
The Y2k Problem and Security Technology - 07/1998
Trade Terms and Conditions - and Internet Access - 05/1998
Modern Times - The Durability of Data- 02/1998
Electronic Information Channels Used by Virus Programmers - 12/1997
Remote Access Services - Open Doors for Crackers - 10/1997
Dangerous Corporate Internet Use - Two Cases - 09/1997
The Emperor's New Clothes (once more)
Antivirus-Problems under Windows 95 - 10/1996
Risks in Wireless Network Technology - 05/1996
Security Problems in Wide Area Networks - 05/1996
Smart-card Security Aspects - 06/1995
Encryption Generators Used in Computer Viruses - Part 1 - 05/1995
Encryption Generators Used in Computer Viruses - Part 2 - 05/1995
Preventive Measures against Computer Viruses - 02/1995
Information Security Training for Users - 02/1995
Virus Construction Kits - 08/1994
Some Aspects of Virus Prevention - 08/1994
Computer Viruses for Military Purposes - 08/1994
Telecommunication Security - 07/1994
First steps in case of a virus infection - 06/1994