|
OpenSSH cutting edge
2005-12-19 Federico Biancuzzi interviews OpenSSH developer Damien Miller to discuss features included in the upcoming version 4.3, public key crypto protocols details, timing based attacks and anti-worm measures. http://www.securityfocus.com/columnists/375 Users inundated with pop-ups 2005-12-12 There are many examples where users are now being inundated with pop-up messages asking them to respond to things they don't know about or don't understand, and it leads to weaker security overall. http://www.securityfocus.com/columnists/374 Trusting software 2005-12-07 Trust is in everything we do, from the important to the mundane. Whether it's open-source or closed-source, how do we evaluate what software, companies and projects are safe to trust? http://www.securityfocus.com/columnists/373 Regaining control 2005-11-29 Securing endpoint systems by locking them down using complex software brings back memories of another era, where business computers were once used for business applications only - and businesses retained control over their assets and data. http://www.securityfocus.com/columnists/372 Tenable discusses the Nessus 3 release 2005-11-24 SecurityFocus interviews Ron Gula to get a glimpse of Tenable's upcoming free (but closed-source) Nessus 3 vulnerability scanner. The discussion looks at license changes, community involvement, daemon security, new features, GPL open-source versus free, NASL, and more. http://www.securityfocus.com/columnists/371 Sony-baloney 2005-11-22 The Sony story brings up dozens of questions about where we are headed with DRM issues and security, and what's really at stake. http://www.securityfocus.com/columnists/370 Sony's legal issues 2005-11-14 Sony is in the spotlight over the rootkit they distribute on some of their music CDs, and it brings up interesting legal issues relating to EULAs and enforcement by the FTC. http://www.securityfocus.com/columnists/369 Linux worm overrated 2005-11-09 The latest and greatest Linux worm isn't the most elegant or fastest spreading worm, or even one that's difficult to stop, but it still offers a warning for Web developers and administrators everywhere. http://www.securityfocus.com/columnists/368 Automatic graylisting of unwanted software 2005-11-03 In the race to secure endpoint systems, a new approach known as automatic graylisting can give administrators control over unwanted software installed on end user systems. http://www.securityfocus.com/columnists/367 Balancing surveillance 2005-11-01 With camera and network surveillance now commonplace, and database abuse continuing to appear, how do we balance the positive side of security along with its potential for abuse? http://www.securityfocus.com/columnists/366 |
|
Privacy Statement |