What does the government know about you?

It seems that one of the most paranoid suppositions regarding government control of regular citizens is partly true. Wired reports that they managed to procure declassified …

SQL Injection Attacks and Defense

SQL injection is a code injection technique that exploits a security vulnerability occurring in the database layer of an application. It occurs when user input is either …

A closer look at Trend Micro HijackThis 2.0.2

HijackThis is a tiny program helps you get rid of persistent spyware by examining vulnerable or suspect parts of your system, such as browser helper objects and certain types …

Web 2.0 Architectures

What is Web 2.0? There is still no definitive and all-encompassing definition for the phenomenon, and there probably never will be. One thing that is known for sure is that it …

A closer look at F-Secure Internet Security 2010

Following a redesign of their logo and their motto, F-Secure redesigned their Internet Security suite. F-Secure Internet Security 2010 is a security solution designed for …