Columnists (Page 25 of 48)   < Prev  20 21 22 23 24 25 26 27 28 29 30  Next >
Big Brother's Last Mile
by Mark Rasch, 2004-08-16
The FCC's new ruling on broadband wiretaps will force customers to pay for the privilege of making the Internet less secure.
http://www.securityfocus.com/columnists/261

The Panacea of Information Security
by Jason Miller, 2004-08-12
Step away from all the vendor hype. The one device that will always be the best tool for information security is a competent security professional.
http://www.securityfocus.com/columnists/260

Redmond's Salvation
by Tim Mullen, 2004-08-11
Service Pack 2 for XP represents a sea change in Microsoft's security posture. Here's why you should ignore the naysayers and start planning your upgrade.
http://www.securityfocus.com/columnists/259

Email Privacy is Lost
by Scott Granneman, 2004-07-29
As if the common use of "web bugs" inside spam was not enough, companies are using new techniques to watch and track the private emails you read, forward, print, and more.
http://www.securityfocus.com/columnists/258

A Promise Falls in the Forest
by Mark Rasch, 2004-07-26
A federal court recently ruled that website privacy policies aren't binding, because nobody reads them. The implications are far reaching for contract law and the Internet.
http://www.securityfocus.com/columnists/257

Mac OS X ? Unix? Secure?
by Daniel Hanson, 2004-07-21
Apple's OS X is not safer or less susceptible to vulnerabilities and viruses than other OSes, and Apple's secretive culture is bad for the security world.
http://www.securityfocus.com/columnists/256

The Pied Piper Syndrome
by Tim Mullen, 2004-07-19
Making electronic voting terminals more like slot machines won't keep elections secure from tampering.
http://www.securityfocus.com/columnists/255

Service Pack Deux?
by Scott Granneman, 2004-07-08
Microsoft should make SP2 available to all users and backport the changes to older operating systems, or they risk putting profits ahead of security yet again.
http://www.securityfocus.com/columnists/254

Close the E-Mail Wiretap Loophole
by Mark Rasch, 2004-07-05
Some pretty sleazy operators are slipping through a hole in a federal wiretap law that arguably leaves your e-mail unprotected from snooping.
http://www.securityfocus.com/columnists/253

The Allure and Curse of Complexity
by Jason Miller, 2004-07-01
The curse of complexity is the bane of every security administrator, so UNIX users take your pick: would you like BSD or Linux?
http://www.securityfocus.com/columnists/252

Columnists (Page 25 of 48)   < Prev  20 21 22 23 24 25 26 27 28 29 30  Next >


 

Privacy Statement
Copyright 2010, SecurityFocus