Please turn on your JavaScript for this page to function normally.
Designing a PCI-Compliant Log Monitoring System

Log monitoring activities are an integral part of Requirement 10 of the PCI Data Security Standard and it can be difficult to understand how the different logging portions of …

Guide to Online Antivirus Solutions Part 5: BitDefender Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Super Ninja Privacy Techniques for Web App Developers

If I keep my documents on Google Docs, my mail on Yahoo Mail, my bookmarks on del.icio.us, and my address book on .Mac, is there any point in talking about the privacy of my …

MacNikto: Working with the Nikto Web Server Security Scanner on the Mac

Nikto is an open source web server scanner which performs comprehensive tests against web servers for multiple items, including over 3300 potentially dangerous files/CGIs, …

Know Your Enemy: Malicious Web Servers

Today, many attackers are part of organized crime with the intent to defraud their victims. Their goal is to deploy malware on a victim’s machine and to start collecting …

Guide to Online Antivirus Solutions Part 4: Norman SandBox Malware Analyzer

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Malware Evolution: April – June 2007

The events that took place during the first six months of 2007 have shown us that the direction in which threats are evolving is from social engineering to the increased usage …

Working with the iStumbler Wireless Discovery Tool

iStumbler is the leading wireless discovery tool for Mac OS X. It provides plugins for finding AirPort networks, Bluetooth devices and Bonjour services. The application is …

Interview with Christen Krogh, Opera Software’s VP of Engineering

Christen Krogh is responsible for all software development at Opera. Krogh received his bachelor’s degree in computer science from Glasgow University and his Ph.D from …

Guide to Online Antivirus Solutions Part 3: Kaspersky Online Scanner

Internet connections are getting faster every day, so online antivirus solutions transformed from proof of concepts into actual quality security services. Lately I have been …

Compliance, IT Security and a Clear Conscience

Never has the need to prove compliance with external regulations and internal policies been more acute than it is today. The likely consequences of failing to prove that your …

Step-by-step Guide to Online Amazon S3 Backups with Jungle Disk

Jungle Disk is an application that lets you store files and backup data securely to Amazon.com’s S3 Storage Service. Amazon S3 provides a simple web services interface …

Don't miss

Cybersecurity news