General security July 27, 2012 John Locke Keeping Your Site Safe Online Why do websites get hacked? Websites get hacked for a bunch of different reasons: To plant hidden links to other sites in an attempt to game search engines...
General security July 26, 2012 Adrian Stolarski Lifehacking – What It Really Is Two things made me write this article. The first was a conversation with a friend of mine, Luigi (Thanks Luigi!) The second was a conversation I had with a...
General security July 23, 2012 Jack Koziol Interview: Tony Busseri, CEO of Route1 Tony Busseri is the CEO of Route1. He leads the management team in executing Route1’s strategic vision. Mr. Busseri is an entrepreneurial executive with a...
General security July 23, 2012 Jack Koziol Interview: Charles Weaver, CEO of MSPAlliance Charles Weaver is the co-founder and CEO of the MSPAlliance. In addition to running the daily operational operations of the association, he writes and speaks...
General security July 11, 2012 Prateek Gianchandani Defending the Internet with Project Meshnet Introduction Topics related to Internet censorship have been debated frequently in the last few years. The main purpose of most Internet censorship actions...
General security June 27, 2012 Tom Olzak Chapter 9: Securing remote access Remote access is no longer just about a laptop or home desktop user connecting to catch up on some work or update customer and order information. The explosion...
General security June 26, 2012 McGraw Hill Chapter 5: CRPD & Security In Wireless Network Security: A Beginner's Guide, author Tyler Wrightson discusses the many attack vectors that target wireless networks and clients, and explains...
General security June 26, 2012 Ian Palmer Interview: Author Tyler Wrightson Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the author of Wireless Security: A Beginner’s Guide (McGraw-Hill; 2012), the founder and president of Leet...
General security June 21, 2012 Jay Turla Interview with Joshua Arvin Lat Interview with Joshua Arvin Lat: the Kaspersky International Cup 2012 and Kaspersky Asia Pacific & MEA Cup 2012 winner For today's hot seat we have Joshua...
General security June 19, 2012 Tom Olzak Chapter 8 – UEFI and the TPM: Building a foundation for platform trust Traditional boot processes cannot stop sophisticated attacks instantiated before operating system load. Consequently, we need a method to ensure that when the...