LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Peer-to-peer networks co-opted for DOS attacks
29 May 2007
A flaw in the design of a popular peer-to-peer network software has given attackers the ability to c
Network Security
1 - 2 min read
How to secure VNC remote access with two-factor authentication
22 May 2007
If you haven't already, you can download a copy of the WiKID open-source token client. The first tim
Network Security
1 - 2 min read
IPv6 firewalling knows no middle ground
09 May 2007
Two months ago, we published Everything you need to know about IPv6, telling you the following abou
Firewalls
1 - 2 min read
Sloppy configurations make for unsecured VPNs
22 February 2007
The IP extension IPSec is generally considered the most secure VPN technology. But it also has its w
Network Security
1 - 2 min read
Danger inside the firewall
20 February 2007
Between the latest firewall technology and advanced intrusion detection systems, IT professionals ar
Firewalls
1 - 2 min read
Home routers are open to remote attack
20 February 2007
They have demonstrated that users could open up their router's traffic as a result of visiting a web
Network Security
1 - 2 min read
Cisco warns of more router vulnerabilities
14 February 2007
The intrusion prevention capabilities of Cisco Systems' routers could be prone to attack, after the
Network Security
1 - 2 min read
Attack seriously slows two root servers
07 February 2007
A denial-of-service attack apparently overwhelmed two of the thirteen root domain name servers early
Network Security
1 - 2 min read
Stompy session analyzer tool released
30 January 2007
Michal Zalewski, an independent security researcher, announced the availability of Stompy, a free to
Network Security
1 - 2 min read
Port Knowledgebase
21 January 2007
List of frequently seen TCP and UDP ports and what they mean. The goal of this port table is to poin
Network Security
1 - 2 min read
Ajax Sniffer - Prrof of concept
18 January 2007
The original idea was discussed by Stefano Di Paola in his paper Subverting Ajax. I have simply crea
Network Security
1 - 2 min read
CSI: TCP/IP
03 January 2007
Located on the less fashionable north end of the Las Vegas strip, the Riviera Hotel and Casino has s
Network Security