General security July 11, 2012 Prateek Gianchandani Defending the Internet with Project Meshnet Introduction Topics related to Internet censorship have been debated frequently in the last few years. The main purpose of most Internet censorship actions...
General security June 27, 2012 Tom Olzak Chapter 9: Securing remote access Remote access is no longer just about a laptop or home desktop user connecting to catch up on some work or update customer and order information. The explosion...
General security June 26, 2012 McGraw Hill Chapter 5: CRPD & Security In Wireless Network Security: A Beginner's Guide, author Tyler Wrightson discusses the many attack vectors that target wireless networks and clients, and explains...
General security June 26, 2012 Ian Palmer Interview: Author Tyler Wrightson Tyler Wrightson, CISSP, CCSP, CCNA, CCDA, MCSE, is the author of Wireless Security: A Beginner’s Guide (McGraw-Hill; 2012), the founder and president of Leet...
General security June 21, 2012 Jay Turla Interview with Joshua Arvin Lat Interview with Joshua Arvin Lat: the Kaspersky International Cup 2012 and Kaspersky Asia Pacific & MEA Cup 2012 winner For today's hot seat we have Joshua...
General security June 19, 2012 Tom Olzak Chapter 8 – UEFI and the TPM: Building a foundation for platform trust Traditional boot processes cannot stop sophisticated attacks instantiated before operating system load. Consequently, we need a method to ensure that when the...
General security June 15, 2012 Joshua Protect Your Wireless Network from Leechers and Hackers Nowadays pretty much everyone uses wireless networking from your smart phone to your home and/or business networks. There are many security issues with wireless...
General security June 14, 2012 Kyriakos Economou IObit Protected Folder Authentication Bypass Acknowledgements I would like to dedicate this article to all my friends, they know who they are, and to Irene, for her love and support. Intro From time...
General security June 11, 2012 Tom Olzak Chapter 7: The role of cryptography in information security After its human resources, information is an organization's most important asset. As we have seen in previous chapters, security and risk management is data...
General security June 8, 2012 Scott Miller In-Depth WordPress Security Note: the following suggestions are at your own risk! This article assumes some level of understanding of what changes are being suggested. Wordpress is the...