Columnists (Page 7 of 48)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >
Security Analogies
by Scott Granneman, 2007-05-29
Scott Granneman discusses security analogies and their function in educating the masses on security concepts.

Your Space, My Space, Everybody's Space
by Mark Rasch, 2007-05-23
Privacy is about protecting data when somebody wants it for some purpose. It is easy to protect data that nobody wants.

Time for a new certification
by Don Parker, 2007-05-01
I wrote a column for Securityfocus some time ago that aired my concerns over GIAC dropping the practical portion of their certification process. That column resulted in a lot of feedback, with most agreeing about how GIAC bungled what was up till then, the best certification around.

0wning Vista from the boot
by Federico Biancuzzi, 2007-04-24
Federico Biancuzzi interviews Nitin and Vipin Kumar, authors of VBootkit, a rootkit that is able to load from Windows Vista boot-sectors. They discuss the "features" of their code, the support of the various versions of Vista, the possibility to place it inside the BIOS (it needs around 1500 bytes), and the chance to use it to bypass Vista's product activation or avoid DRM.

Online Impersonations: No Validation Required
by Dr. Neal Krawetz, 2007-04-20
It is said that imitation is the sincerest form of flattery. Unfortunately, online social networks provide no method for distinguishing an impersonation from the real thing. While your online words and actions may circulate for years, so do those of an impersonator.

The Politics of E-Mail
by Mark Rasch, 2007-04-17
It’s springtime in Washington, D.C. The cherry blossoms have bloomed, the tourists descended, and on both sides of Pennsylvania Avenue a new "scandal" is erupting.

Metasploit 3.0 day
by Federico Biancuzzi, 2007-03-27
The Metasploit Framework is a development platform for creating security tools and exploits. Federico Biancuzzi interviewed H D Moore to discuss what's new in release 3.0, the new license of the framework, plans for features and exploits development, and the links among the bad guys and Metasploit and the law.

Blanket Discovery for Stolen Laptops
by Mark Rasch, 2007-03-12
Mark Rasch discusses the legal issues behind the discovery and recovery of stolen laptops that use LoJack-style homing devices to announce their location, and the location of the thieves, anywhere in the world.

Zero Day Patches
by Federico Biancuzzi, 2007-02-28
Zero day exploits were once the realm of just underground and elite hackers, but their increased prevalence is bringing a positive new trend: unofficial patches from members of the community, offered for protection before official vendor patches appear. Federico Biancuzzi interviewed Landon Fuller, who wrote Mac OS X patches for recent Month of Apple Bugs vulnerabilities, and the ZERT team, which has offered patches for critical Microsoft Windows zero-days that were actively exploited.

Vista Review: Bugs and Confusion
by Thomas C. Greene, 2007-02-19
The Register's Thomas C. Greene offers an entertaining review of Windows Vista, noting price differences in Europe, driver compatibility issues, and security and user interface issues that affect the Vista experience.

Columnists (Page 7 of 48)   < Prev  2 3 4 5 6 7 8 9 10 11 12  Next >


Privacy Statement
Copyright 2010, SecurityFocus