Columnists (Page 3 of 48)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >
Just EnCase It's Not a Search
by Mark Rasch, 2008-11-21
The U.S. government attempts to exclude a scan of a computer's file system from the definition of a search. They failed, but the issue will rise again, argues attorney and SecurityFocus contributor Mark Rasch.
http://www.securityfocus.com/columnists/485

Microsoft's Stance on Piracy Affects Us All
by Oliver Day, 2008-11-14
Operating-system piracy hurts Microsoft's bottom line, but in its fight against software pirates, the company maybe hurting the rest of the Internet to help itself.
http://www.securityfocus.com/columnists/484

Clicking to the Past
by Chris Wysopal, 2008-10-21
“Clickjacking” may be new, but attacks on the user interface are not. Security professional Chris Wysopal argues that browsers will have to be more restrictive to defend against this type of attack.
http://www.securityfocus.com/columnists/483

The Vice of Vice Presidential E-Mail
by Mark Rasch, 2008-10-06
The recent investigation of the "hack" into U.S. vice presidential candidate Sarah Palin’s Yahoo e-mail account demonstrates that the law is not a clearly defined thing.
http://www.securityfocus.com/columnists/482

Blaming the Good Samaritan
by Houston Carr, 2008-09-26
A student at Carleton University faces charges for finding flaws in the school's e-mail system. In a guest column this week, Auburn University Professor Houston Carr argues that intentions should count when dealing with a network intruder.
http://www.securityfocus.com/columnists/481

The Boston Trio and the MBTA
by Mark Rasch, 2008-09-23
Three MIT students found themselves under legal attack last month for exposing flaws in the Boston subway system. Despite the attempt to silence the trio, the law continue to support vulnerability disclosure, says SecurityFocus contributor and attorney Mark Rasch.
http://www.securityfocus.com/columnists/480

From Physics to Security
by Federico Biancuzzi, 2008-09-16
Contributor Federico Biancuzzi chatted up Wietse Venema, the co-creator of the Security Administrator Tool for Analyzing Networks, to talk about the current state of security, anti-spam technology and how to reduce the number of vulnerabilities in software.
http://www.securityfocus.com/columnists/479

Get Off My Cloud
by Mark Rasch, 2008-08-19
A recent decision by a federal appeals court in Cincinnati leaves U.S. citizens up in the air, if they hoped that nebulous privacy rules would apply to cloud-computing services.
http://www.securityfocus.com/columnists/478

An Astonishing Collaboration
by Dan Kaminsky, 2008-07-09
On Tuesday, software developers and network-hardware providers released a patch for a significant flaw in the domain-name service (DNS) system. The researcher who found the bug, Dan Kaminsky, talks about the issue and the history of DNS problems in the column, reprinted with permission from his site.
http://www.securityfocus.com/columnists/477

Bad-Code Blues
by Don Parker, 2008-07-08
Despite advances in secure-coding practice, most developers continue to let serious security bugs slip into their programs. SecurityFocus contributor Don Parker argues that until customers hold their software providers responsible, bad code will keep coming.
http://www.securityfocus.com/columnists/476

Columnists (Page 3 of 48)   < Prev  1 2 3 4 5 6 7 8 9 10 11  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus