Expert analysis
Trusted Debian v1.0 officially released
The Trusted Debian project aims to create a highly secure but usable Linux platform. To accomplish this, the project will use currently available security solutions for Linux …
NetBSD 1.6.1 has been released
The NetBSD operating system is a full-featured, open source, UNIX-like operating system descended from the Berkeley Networking Release 2 (Net/2), 4.4BSD-Lite, and …
Interview with Andrew G. Mason, author of “Cisco Secure Virtual Private Networks”
Andrew G. Mason, CCIE #7144, CCDP, CSS-1, is the CEO of three UK-based companies: Mason Technologies, CCStudy.com (resource site for Cisco Certification), and Boxing Orange. …
Centrally Managed Network Security: Hope or Reality?
Ask any IT professional to predict the future of computer networking and you will get different answers. Guessing the future of technology has always been a dicey business at …
Core Security Announces IMPACT 3.0 Penetration Testing Framework
Strategic security solutions developer Core Security Technologies, announced CORE IMPACT 3.0 – the new release of their penetration testing framework. Designed to …
Funk Software Announced Odyssey Secure 802.11 Client for Pocket PC
Wireless LAN security solutions provider Funk Software, recently announced Odyssey Client for Pocket PC. This new version of their 802.1x access client, gives the handheld …
Adobe Acrobat 6.0 Strengthens Electronic Document Security
Adobe Systems is advancing security for electronic documents with the recent release of their Adobe Acrobat product family and Adobe Portable Document Format (PDF). New …
Online Credit and Debit Card Security Report
Independent market analyst Datamonitor, released a new report focused on the situation of online credit and debit card security. E-Commerce payment volumes will continue to …
Linux Security: Kinds of Encryption
This is an excerpt from “A Practical Guide to Red Hat Linux 8“. An interview with the author is available here. Security Security is a major part of the foundation …
PKI… Why Go Through the Hassle?
As e-mail increasingly substitutes the use of letters and faxes (also to governmental bodies) and as commercial transactions on the web get more and more important to …
Interview with Scott Hawkins, author or “Essential Apache for Web Professionals”
Who is Scott Hawkins? I’m a computer geek. I’ve been fascinated with computers since my Dad bought me my first one at the age of 12 (it was a Commodore VIC-20 with …
Implementing Basic Security Measures
Abstract When we talk about implementing basic security measures, one could think “And what are those?” And if that question would be asked, it would be a very, …