Content Injection: Hack the Hacker

Friday, April 11th, 2008

Traditional IDS/IPS systems occur at the network level, usually plugged into a spanning port on a switch. I love this concept and think it should be part of any defense in depth strategy. The two primary weaknesses in these devices are, (1) they cannot process encrypted streams and (2) they ...

How to keep your password hidden in plain sight

Friday, April 11th, 2008

When all of your users have decided to keep their passwords written down on sticky notes, on their hands and under their keyboards how do you protect them from themselves?  You could go ahead and rip off each of their finger nails (ouch) until they promise to never write it ...

Linux Replacements for Your Favorite Windows Apps

Friday, April 11th, 2008

For many users, getting started with Linux is surprisingly easy. New, friendlier versions of the free operating system, such as Fedora and Ubuntu, feature straightforward menus and automated installations that make switching from Windows to Linux a relatively simple process. But a lot of people who try Linux dump it and ...

Anti Keylogger Shield – protect against keyloggers

Thursday, April 10th, 2008

Anti Keylogger Shield is a powerful, easy to use anti-spy software tool that prohibits operation of any keylogger, either know or unknown, professional or custom made. Once installed, Anti Keylogger Shield will run silently in your System Tray, block the system mechanisms that are exploited by keyloggers, and protect your ...

Trend Micro Web Protection Add-On

Thursday, April 10th, 2008

Complement your existing desktop protection (see list below) with Trend Micro Web Protection Add-On—a lightweight add-on trial solution designed to proactively protect your computer against Web threats and bot infiltration. Web Protection Add-On uses Trend Micro’s revolutionary in-the-cloud security technology to monitor outbound Web requests. This real-time protection proactively scans ...