Expert analysis
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”
Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …
Implementing Basic Security Measures
Abstract When we talk about implementing basic security measures, one could think “And what are those?” And if that question would be asked, it would be a very, …
RSA Security Launches Developer Central Web Site
RSA Security yesterday announced a grand opening of RSA Developer Central, a new web site concentrated on the content geared towards Information Security software developers. …
Interview with Scott Barman, author of “Writing Information Security Policies”
Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …
Catapult Communications supports network security tests
Catapult Communications Corporation announced support for a SIP (Session Initiation Protocol) test suite that has been sanctioned by CERT. The Catapult DCT2000 and LANCE test …
Business Continuity – More Than Simply Recovering From a Disaster
If your organisation believes that Business Continuity is all about having back-up computers in the event of a disaster, it is wrong! Martin Turner, a senior consultant with …
Mass-Market Authentication: the Gateway to Access-Hungry Consumers
Introduction Whether you’re at the cash machine, online to your bank or credit card company or on the phone to your insurance or mortgage provider, until now, the need …
A quick way to secure a Linux system
The first step in securing your system is to determine what the function of that system is going to be. For example, if the system is going to be dedicated to being an ftp …
Using Linux VMware and SMART to Create a Virtual Computer to Recreate a Suspect’s Computer
Since beginning my endeavors with computer forensics, I have always wanted the ability to boot up a suspects computer just to see what the user saw when he was using the …
Securing Online Payments
From the early days of the Internet, credit and charge card companies recognised the enormous opportunities presented to them – but they also saw challenges ahead. …
SSH Demonstrates QuickSec Toolkit Integration With MontaVista Linux
The SSH QuickSec Toolkit Family is specifically designed to let network device developers and OEMs quickly and easily implement IPSec functionality. Optimized and validated …
Iraq Dragged Into The Infamous 419 Scam
Scammers are not just persistent and shameless, but they are opportunistic as well, therefore it is only logical that they would now try to profit from the plight of Iraqis …
Featured news
Resources
Don't miss
- Critical SAP NetWeaver flaw exploited by suspected initial access broker (CVE-2025-31324)
- Threat actors are scanning your environment, even if you’re not
- GoSearch: Open-source OSINT tool for uncovering digital footprints
- Rack Ruby vulnerability could reveal secrets to attackers (CVE-2025-27610)
- Top must-visit companies at RSAC 2025