A quick way to secure a Linux system

The first step in securing your system is to determine what the function of that system is going to be. For example, if the system is going to be dedicated to being an ftp …

Securing Online Payments

From the early days of the Internet, credit and charge card companies recognised the enormous opportunities presented to them – but they also saw challenges ahead. …

Iraq Dragged Into The Infamous 419 Scam

Scammers are not just persistent and shameless, but they are opportunistic as well, therefore it is only logical that they would now try to profit from the plight of Iraqis …

As Predicted the Spam Problem Rages

As the experts have been predicting, the spam problem is growing at alarming rates and poses much more than an annoyance to businesses as it clogs networks and drags down …

Warchalking and Other Wireless Worries

Wireless technologies promise increase flexibility but are the security risks worth the benefits? Wired computer networks are costly to install and difficult to change, …