Call for papers
SecurityFocus ( www.securityfocus.com ) is currently accepting submissions for new Infocus articles. We would like to extend an invitation to security researchers, authors and academics for submissions on topics of interest to the security community. Submissions should include a short summary along with the author's name, email address and contact information. All submissions should be in MS Word format and should be sent to: email@example.com
Laptop Security, Part Two: Protecting Information on a Stolen Laptop
This is the second of a two-part series on laptop security. In the first installment of this series on Laptop Security we discussed methods of preventing laptop theft using both hardware and software solutions. This article will cover some good methods of mitigating loss when a laptop has been stolen.
Laptop Security, Part One: Preventing Laptop Theft
Laptops have become a valuable part of the computing arsenal. Unfortunately, the mobility, power and connectivity that make laptops so useful to employees and organizations also makes them valuable prizes for thieves. This article, the first in a two-part series devoted to laptop security, will give a brief overview of how users can prevent laptop theft. The second article in this series will discuss steps that users can take to minimize the loss of valuable information through laptop theft.
Welcome to the SecurityFocus "The Basics" Focus Area
An Introduction to Incident Handling
Identifying ICMP Hackery Tools Used In The Wild Today
Firewalls For Beginners
Introduction to Encryption
A Beginner's Guide to the Internet
Evaluating Anti-Virus Software for Home Use