Wednesday, April 30th, 2008
As the world of virtualization moves forward, organisations are faced with compelling reasons to virtualize: factors like server consolidation, high energy bills, faster hardware, ease of use and step back and quick snapshot technology make the virtual computing realm become more attractive.
In some organisations virtualization has already become a large ...
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments
Tuesday, April 29th, 2008
It's long been assumed that Microsoft has built in various "backdoors" for law enforcement to get around its own security, but now reader Kevin Stapp writes in to let us know that the company has also been literally handing out the keys to law enforcement. Apparently, they're giving out special ...
Posted in Hardware, Privacy, Security, Windows | No Comments
Monday, April 28th, 2008
Wireless networking technologies are a rich playground for hackers -- both ethical penetration testers and malicious attackers. There are many avenues of attack, ranging from attacking the infrastructure, the clients, or the actual traffic through man-in-the-middle sniffing and manipulation. Rich Mogull covered the wireless “Evil Twin” attack in his recent ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Saturday, April 26th, 2008
It works seamlessly with any hardware and operating system combination supporting USB keyboards such as Windows, MacOS, Linux and others. The Key generates and sends unique time-variant authentication codes by emulating keystrokes through the standard keyboard interface. The computer to which the Key is attached receives this authentication code character ...
Posted in Hardware, Privacy, Security | No Comments
Thursday, April 24th, 2008
Earlier I wrote about my proposed Tactical Network Security Monitoring Platform. Today I finally sat down and installed the operating systems I need on this system to create a portable tactical forensics and investigation platform. I did not want to use my main work laptop for this sort of work ...
Posted in Coding, Hardware, Internet, Linux, Networking, Security, Software, Windows | No Comments