LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Diffie: Infrastructure a disaster in the making
13 April 2005
In the 1970s, Martin Hellman and Whitfield Diffie wrote the recipe for one of today's most widely us
Network Security
1 - 2 min read
Using a Linux failover router
12 April 2005
Today, it's hard to imagine an organization operating without taking advantage of the vast resources
Network Security
1 - 2 min read
And here's a key to combat hacking
11 April 2005
As we rely more on computers, the potential for hackers to hurt us and destroy our personal record
Network Security
1 - 2 min read
U.S. government agencies turn to Linux
06 April 2005
As government agencies are being forced to do more with a smaller budget more agencies are turning t
Government
1 - 2 min read
Hack Job
04 April 2005
When a hacker broke into the network at George Mason University (VA) earlier this year, IT officials
Network Security
1 - 2 min read
Open Source For Perimeter Security
24 March 2005
There is a widespread and wholly inaccurate impression that open source development is somehow hapha
Network Security
1 - 2 min read
How to set up DNS for Linux VPNs
24 March 2005
One often-overlooked requirement of a functioning VPN is DNS. For any host-network or network-networ
Network Security
1 - 2 min read
Senators Address Spyware, Spam
23 March 2005
Laws against theft don't end stealing, and laws against the ills of the Internet age aren't likely t
Government
1 - 2 min read
Mobile IPv6 On Linux
23 March 2005
The woman who cut me off on the freeway because she was too busy talking on her cell phone might not
Network Security
1 - 2 min read
Two floppy-based firewalls
14 March 2005
When you look in your closet, do you see a pile of obsolete hardware that you just cannot bring your
Firewalls
1 - 2 min read
Review: Astaro Security Linux 5.1
08 March 2005
One of the more popular uses for Linux is as a router/firewall to secure a local area network (LAN)
Firewalls
1 - 2 min read
DNS-Based Phishing Attacks on The Rise
08 March 2005
Phishing fraudsters are using a pair of DNS exploits to help give them the illusion of credible dom
Network Security