Columnists (Page 13 of 48)   < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >
Coffee shop WiFi for dummies
by Scott Granneman, 2006-02-09
The average user has no idea of the risks associated with public WiFi hotspots. Here are some very simple tips for them to keep their network access secure.
http://www.securityfocus.com/columnists/385

Nmap 4.00 with Fyodor
by Federico Biancuzzi, 2006-01-31
After more than eight years since its first release in Phrack magazine, Fyodor has announced Nmap 4.00. Curious as usual, Federico Biancuzzi interviewed Fyodor on behalf of SecurityFocus to discuss the new port scanning engine, version detection improvements, and the new stack fingerprinting algorithm under work by the community.
http://www.securityfocus.com/columnists/384

Google's data minefield
by Mark Rasch, 2006-01-30
The U.S. government's broad subpoena to search engines effectively seeks to mine the data of the Internet. While Google has resisted the subpoena, there may be little they can do to protect our privacy from many prying eyes.
http://www.securityfocus.com/columnists/383

Debunking the WMF backdoor
by Thomas C. Greene, 2006-01-23
Claims that the WMF vulnerability was an intentional backdoor into Windows systems makes for an interesting conspiracy theory, but doesn't fit with the facts.
http://www.securityfocus.com/columnists/382

Tech support woes
by Scott Granneman, 2006-01-20
Technical support that's outsourced to foreign countries can cause frustration and have a negative impact on security when the problems remain unsolved.
http://www.securityfocus.com/columnists/381

How not to respond to a security advisory
by Jason Miller, 2006-01-18
A recently announced weakness in the BSD securelevel system isn't going to be fixed in OpenBSD. While securelevel may have problems, the vendor's security response is unacceptable and doesn't fit with their stated goals.
http://www.securityfocus.com/columnists/380

Wiretapping, FISA, and the NSA
by Mark Rasch, 2006-01-11
U.S. wiretapping laws, FISA and Presidential powers given to the NSA to intercept communications make for interesting times when coupled with technology. What are the issues surrounding privacy, search, seizure and surveillance?
http://www.securityfocus.com/columnists/379

Patching a broken Windows
by Robert Lemos, 2006-01-09
Robert Lemos interviews Datarescue's senior software developer Ilfak Guilfanov, the creator of the unofficial patch for the flaw in the Windows Meta File format that saw tens of thousands of downloads prior to the official patch release by Microsoft. Guilfanov explains why he decided to issue a patch for the vulnerability, how he created the patch, and his thoughts on whether third-party patches are generally a good thing.
http://www.securityfocus.com/columnists/378

Zero-day holiday
by Kelly Martin, 2006-01-04
A few hundred million Windows XP machines lay vulnerable on the Web today, a week after a zero-day exploit was discovered. Meanwhile, new approaches and ideas from the academic world - that focus exclusively on children - may give us hope for the future after all.
http://www.securityfocus.com/columnists/377

Tracked by cellphone
by Mark Rasch, 2005-12-22
We know that technology can be used to track people's location via a cellphone, but how difficult is it for law enforcement to get a court order and do this legally?
http://www.securityfocus.com/columnists/376

Columnists (Page 13 of 48)   < Prev  8 9 10 11 12 13 14 15 16 17 18  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus