The folks over at Six Apart have written a useful article on the whole issue of spam and how to beat it, it’s quite informative if you are new to …
JPEG rendering has security flaw
Microsoft has added a security patch for JPEG Processing (GDI+). The patch is quite interesting because it fixes a flaw in the rendering of a JPEG image by software code …
Crypto conference reveals MD5 flaw
An interesting article in MIT Technology Review which comments on how researchers in France, Israel and China have found flaws in the MD5 encryption. An algorithm and encryption that up …
Computer virus Rbot-GR uses webcams
A new computer virus called, Rbot-GR uses webcams to literally spy and snoop at victims. It appears to be capable of turning on webcams and sending images and video via …
PBS Frontline’s documentary on Cyber War
The entire 52 minute program by PBS Frontline on Cyber War can be downloaded from the programs website.
Blocking spam bots from accessing your site
Mark Pilgrim comments on a technical post on how to block spam automated robots and spiders from accessing your site & content and eating your bandwidth. He comments on how …
What is PGP?
PGP stands for ?Pretty Good Privacy?. It?s an excellent public-key encryption package that you can use to secure communications from a client to server. It is available also as an …
Big Brother Is No Longer Fiction
An interesting article on MIT’s Alumni website commenting on new Information privacy laws. The article is titled “Big Brother Is No Longer Fiction: On the Internet, Everyone Knows You’re a …
Who's to blame for Slammer worm
The search for who to blame increases after last weeks “Slammer” worm virus slowed down the web. This CNN Tech article by Jeordan Legon comments on the vulnerabilities of SQL2000, …
SAIC network designed specifically to catch and study hackers behaviour
I was speaking to Kevin on my way home the other night, about this article and the SAIC network designed specifically to catch and study hackers behaviours. The article was …
Nasa on WEP security in Wireless LANs & 802.11
A nice article by J C Welch on how NASA overcame the security problems imposed by WEP in Wireless LANs and 802.11 ::: www.workingmac.com/inetd/50.wm A working paper of the article …
Wi-Fi and the right direction
An interesting article on Wi-Fi and whether it’s heading in the right direction www.80211-planet.com/news/article/0,4000,1481_1107451,00.html
Online after moving offices
I’m finally online for a few posts after a heavy duty network rellocation and upgrade in our premises. This thing is too secure now! Bring back ICQ!
Notebook Security by NW Fusion
A closer look at Notebook Security www.nwfusion.com/net.worker/columnists/2001/0326zbar.html and a good article in ZDNet www.zdnet.com/products/stories/reviews
Have you sold your soul
Have you sold your soul lately? Privacy advocate and Internet security expert Roger Clarke says cookies are like “a store being able to tattoo a bar code on your forehead …
- Page 1 of 2
- 1
- 2