Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
Columnists (Page 1 of 37)   1 2 3 4 5 6 7 8 9 10 11  Next >
Human rights and wrongs online
by Mark Rasch, 2006-03-13
A government's position on censorship used to protect its citizenry is dictated by who they are. The well-popularized censorship of Internet content in China by Google and other big players, and criticism of this by the U.S. government, is really just the tip of the iceburg.
http://www.securityfocus.com/columnists/392

The value of vulnerabilities
by Jason Miller, 2006-03-07
There is value in finding vulnerabilities. Yet many people believe that a vulnerability doesn't exist until it is disclosed to the public. We know that vulnerabilities need to be disclosed, but what role do vendors have to make these issues public?
http://www.securityfocus.com/columnists/391

The big DRM mistake
by Scott Granneman, 2006-03-01
Digital Rights Managements hurts paying customers, destroys Fair Use rights, renders customers' investments worthless, and can always be defeated. Why are consumers and publishers being forced to use DRM?
http://www.securityfocus.com/columnists/390

Spreading security awareness for OS X
by Robert Lemos, 2006-02-27
Robert Lemos interviews Kevin Finisterre, founder of security startup Digital Munition, who created the three recent versions of the InqTana worm to raise awareness of security in Apple's OS X. Finisterre discusses his reasons for creating the worms, the problems with Mac OS X security, and why he does not fear prosecution.
http://www.securityfocus.com/columnists/389

John the Ripper 1.7, by Solar Designer
by Federico Biancuzzi, 2006-02-22
Federico Biancuzzi interviews Solar Designer, creator of the popular John the Ripper password cracker. Solar Designer discusses what's new in version 1.7, the advantages of popular cryptographic hashes, the relative speed at which many passwords can now be cracked, and how one can choose strong passphrases (forget passwords) that are harder to break.
http://www.securityfocus.com/columnists/388

Strict liability for data breaches?
by Mark Rasch, 2006-02-20
A recent case involving a stolen laptop containing 550,000 people's full credit information sheds new night on what "reasonable" protections a company must make to secure its customer data - and what customers need to prove in order to sue for damages.
http://www.securityfocus.com/columnists/387

Privacy and anonymity
by Kelly Martin, 2006-02-14
Privacy and anonymity on the Internet are as important as they are difficult to achieve. Here are some of the current issues we face, along with a few suggestions on how we can become a little more anonymous on the Web.
http://www.securityfocus.com/columnists/386

Coffee shop WiFi for dummies
by Scott Granneman, 2006-02-09
The average user has no idea of the risks associated with public WiFi hotspots. Here are some very simple tips for them to keep their network access secure.
http://www.securityfocus.com/columnists/385

Nmap 4.00 with Fyodor
by Federico Biancuzzi, 2006-01-31
After more than eight years since its first release in Phrack magazine, Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzzi interviewed Fyodor on behalf of SecurityFocus to discuss the new port scanning engine, version detection improvements, and the new stack fingerprinting algorithm under work by the community.
http://www.securityfocus.com/columnists/384

Google's data minefield
by Mark Rasch, 2006-01-30
The U.S. government's broad subpoena to search engines effectively seeks to mine the data of the Internet. While Google has resisted the subpoena, there may be little they can do to protect our privacy from many prying eyes.
http://www.securityfocus.com/columnists/383

Columnists (Page 1 of 37)   1 2 3 4 5 6 7 8 9 10 11  Next >







 

Privacy Statement
Copyright 2005, SecurityFocus