LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Top 15 Security/Hacking Tools & Utilities
18 April 2006
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing.
Network Security
1 - 2 min read
What's the next security threat?
18 April 2006
In January this year, 20-year-old Jeanson James Ancheta pleaded guilty in a California court to char
Government
1 - 2 min read
Your tax info may not be as secure as you think
17 April 2006
A rule change proposed by the U.S. Treasury Department and the Internal Revenue Service (IRS) has co
Government
1 - 2 min read
Can UK law stop criminal hackers?
17 April 2006
MPs are preparing to get tough on hackers as the law on computer misuse and hacking is up for a reva
Government
1 - 2 min read
"IM me" a strike order
17 April 2006
Flexible military communications have always been of great importance, and flexibility here stands f
Network Security
1 - 2 min read
Disturbing developments in DDoS attacks
14 April 2006
Traditional DDoS of course is when an attacker uses thousands of centrally controlled zombie machine
Network Security
1 - 2 min read
The Enemy Inside
13 April 2006
For many years external security threats received more attention than internal security threats, but
Network Security
1 - 2 min read
US security agency scrutinises secure storage device
12 April 2006
The US National Security Agency (NSA) and Treasure Department have expressed interest in a secure st
Government
1 - 2 min read
Hacking Network Printers
11 April 2006
Hack a printer you say, what kind of toner have you been smoking, Irongeek? Well, I'm here to tell y
Network Security
1 - 2 min read
DNS Cache Poisoning - The Next Generation
11 April 2006
The old problem of DNS cache poisoning has again reared its ugly head. While some would argue that t
Network Security
1 - 2 min read
Intro Build your own gateway firewall
10 April 2006
Learn how to build your own gateway firewall using FreeBSD and old PC parts. The firewall will cons
Network Security
1 - 2 min read
THC-IPV6 Attack Toolkit
10 April 2006
A complete tool set to attack the inherent protocol weaknesses of IPV6
and ICMP6, and includes an
Network Security