| ||Date ||Title ||Author ||Hits |
| || 01-28-13 || ||Terri Wells ||9871 |
Today is Data Privacy Day, a global celebration that commemorates the 1981 signing of the first legally binding international treaty dealing with privacy and data protection. It's a great day to evaluate your firm's data security, and consider what you and your co-workers can do to further safeguard your sensitive data.
| || 01-21-13 || ||Terri Wells ||10445 |
After seeing and hearing about too many successful incidents of hacking and identity theft, one does not need to be a paranoid systems administrator to think passwords might no longer offer strong enough security. Google agrees with this sentiment, and the search giant is testing a device that could replace those pesky passwords with something more hacker-proof.
| || 12-10-12 || ||Terri Wells ||9951 |
These days, running an insecure system can leave your company facing much worse consequences than an offline website. You could face lawsuits. A recent article on a security breach at a large insurance company brings that issue into focus. Keep reading to see how Nationwide is trying to do the right thing.
| || 11-26-12 || ||Terri Wells ||8432 |
Should you worry less or more if your business takes its data to the cloud? That depends on the infrastructure of the data center “cloud” in question. We can learn a lot about how to do it right from Minkels and Deltalis, whose special project is a finalist for the DatacenterDynamics Awards 2012 category “Most Extreme Datacenter Deployment.”
| || 03-23-11 || ||Codex-M ||42316 |
Security is by far the most important aspect that any webmaster should consider for long term website success. A lot of open source and commercial tools are available to scan your website for vulnerabilities. If you are looking for an efficient, powerful, fast and free tool, then you might need to give “Skipfish” a try.
| || 11-05-09 || ||Codex-M ||42859 |
If you are a web developer or administrator, aside from administering your web server, you should also be administering your MySQL database in terms of security. This database is open source and is commonly used with the PHP web server scripting language; tons of useful applications are being developed with this kind of setup. This is good, but it opens up issues, which we'll discuss here along with their solutions.
| || 11-03-09 || ||Codex-M ||122731 |
PHP encryption is a method of obfuscating scripts in such a way that it offers additional protection and prevents unauthorized editing of the scripts. This article discusses both encryption and decryption.
| || 07-25-09 || ||Dev Shed ||13906 |
Microsoft is releasing a security patch for Visual Studio and another "moderate" rated patch for IE for almost all versions. The patches are must-haves for developers that use Visual Studio and any internet explorer users.
| || 07-23-09 || ||Dev Shed ||13511 |
Recent attacks against the United States IT security infrastructure has officials worried that, over the next decade, qualified cyber-security personnel will be at a premium; and a shortage. The question is: how does the USA plan to lure and keep top tech talent to secure and protect the national information infrastructure?
| || 11-13-08 || ||O'Reilly Media ||65345 |
If you're trying to keep your LAN secure, sometimes it helps to think like a cracker. This article shows you how to scout out a LAN, and how malicious hackers get around security. It is excerpted from chapter four of Security Power Tools, written by Bryan Burns et. al. (O'Reilly, 2007; ISBN: 0596009631). Copyright © 2007 O'Reilly Media, Inc. All rights reserved. Used with permission from the publisher. Available from booksellers or direct from O'Reilly Media.
| || 07-30-07 || ||Barzan "Tony" Antal ||30314 |
This is the last part of a three-part series covering encryption and decryption, with a focus on the algorithms used. If you have missed either the first or second part, I encourage you to check them out before reading this part.
| || 07-24-07 || ||Barzan "Tony" Antal ||37801 |
This is the second part of a series covering cryptography algorithms. If by any chance you have missed its first part, I urge you to check it out right now. It is called "An Introduction to Cryptography." In order to understand this article, it is crucial to grasp the concepts explained in that part.
| || 07-23-07 || ||Barzan "Tony" Antal ||93206 |
In the last few decades the science and study of cryptography has earned an outstanding reputation due to its insane applicability and efficiency. Cryptography is the science of message secrecy. Its importance is easily explicable -- it is used everywhere: online purchasing, secured money transfers, cellular phones, broadcast of TV channels, emails, confidential data, and so forth. Our life would be quite different without cryptography.
| || 06-30-05 || ||McGraw-Hill/Osborne ||104904 |
When we talk about “security” we know what we want, but describing it and making it happen can be different matters altogether. Network security has a natural conflict with network connectivity. The more an autonomous system opens itself up, the more risk it takes on. This, in turn, requires that more effort be applied to security enforcement tasks. This article is chapter eight of the book, Cisco: A Beginner's Guide, third edition, by Anthony Velte and Toby Velte (McGraw-Hill/Osborne, 2004, ISBN: 0072256354).
| || 05-19-05 || ||O'Reilly Media ||96738 |
If you want to run a business with a website, security must be high on your list of important matters to get right up front. In this article, you will learn about Internet-based network security assessment and penetration testing, which can help you determine your website's risk of being successfully attacked -- and what to do to fix any problems. It is taken from chapter one of the book Network Security Assessment by Chris McNab (O'Reilly, 2004; ISBN: 059600611X).