Expert analysis
Adobe Acrobat 6.0 Strengthens Electronic Document Security
Adobe Systems is advancing security for electronic documents with the recent release of their Adobe Acrobat product family and Adobe Portable Document Format (PDF). New …
Online Credit and Debit Card Security Report
Independent market analyst Datamonitor, released a new report focused on the situation of online credit and debit card security. E-Commerce payment volumes will continue to …
Linux Security: Kinds of Encryption
This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Security Security is a major part of the foundation …
PKI… Why Go Through the Hassle?
As e-mail increasingly substitutes the use of letters and faxes (also to governmental bodies) and as commercial transactions on the web get more and more important to …
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”
Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …
Implementing Basic Security Measures
Abstract When we talk about implementing basic security measures, one could think “And what are those?” And if that question would be asked, it would be a very, …
RSA Security Launches Developer Central Web Site
RSA Security yesterday announced a grand opening of RSA Developer Central, a new web site concentrated on the content geared towards Information Security software developers. …
Interview with Scott Barman, author of “Writing Information Security Policies”
Who is Scott Barman? Introduce yourself to our readers. I am the author of “Writing Information Security Policies,” a book about the basis of any information …
Catapult Communications supports network security tests
Catapult Communications Corporation announced support for a SIP (Session Initiation Protocol) test suite that has been sanctioned by CERT. The Catapult DCT2000 and LANCE test …
Business Continuity – More Than Simply Recovering From a Disaster
If your organisation believes that Business Continuity is all about having back-up computers in the event of a disaster, it is wrong! Martin Turner, a senior consultant with …
Mass-Market Authentication: the Gateway to Access-Hungry Consumers
Introduction Whether you’re at the cash machine, online to your bank or credit card company or on the phone to your insurance or mortgage provider, until now, the need …
A quick way to secure a Linux system
The first step in securing your system is to determine what the function of that system is going to be. For example, if the system is going to be dedicated to being an ftp …