Please turn on your JavaScript for this page to function normally.
Social Engineering And Other Threats To Internal Security

Consider the following scenario. A good looking woman is wandering around your premises and approaches you asking to show her how to use some functions in Excel or any other …

Declaration of Rights for Administrators and End Users

One network administrator, Susan Bradley, proposed a “Declaration of Rights for Administrators and End Users,” published recently on Patch Management.org. …

Microsoft Patch Tuesday Brings Two Bulletins

This month’s Bulletins include security updates affecting Microsoft Windows and Microsoft Internet Explorer: Microsoft Security Bulletin MS05-054 – Vulnerabilities …

The Unspoken Taboo – The Never Expiring Password

A few months ago we installed a burglar alarm in our house. The company sent a trustworthy employee to do the installation, and he set the whole thing up for us. With sensors …

Web Application Footprinting & Assessment with MSN Search Tricks

Any search engine database is a very powerful source of information for web applications. The Search Engine’s spiders are well-powered to run frequently on sites and …

HNS Holiday Book Giveaway

The holidays are approaching and we are in a giving mood. We’ve prepared this book giveaway in association with the great folks over at O’Reilly, well known for …

Blocking Skype Using Squid and OpenBSD

After much digging online for an effective way to stop this pesky application that is highly de-centralised and a big pain to blocked, I finally found a way to do it. It has …

The 2005 SANS Top 20 Internet Security Vulnerabilities

Four years ago, the SANS Institute and the National Infrastructure Protection Center (NIPC) at the FBI released a document summarizing the Ten Most Critical Internet Security …

OATH Announces 2006 Roadmap for Open Authentication

OATH, the Initiative for Open Authentication, today announced the organization’s 2006 technology roadmap that builds upon the technical framework for open authentication …

How To Lock Down Enterprise Data With Infrastructure Services

How do you protect privacy at the level of individual records in applications, databases, and file systems? As data resources become networked in more complex three tier …

Interview with Alf Watt, Creator of iStumbler

Introduce yourself to our readers. Before writing iStumbler I worked at various startups during the dot-com bubble in San Francisco. After the ‘big pop’ of 2001 I …

Microsoft Patch Tuesday Brings Only One Patch

November’s update is much different than last month’s update since Microsoft released only one patch today. This month’s Security Bulletin affects Microsoft …

Don't miss

Cybersecurity news