The recent release of I2P 2.5.0, an anonymous P2P network that protects against online censorship, surveillance, and monitoring, has brought a slew of improvements and new features that will certainly intrigue security practitioners. This release aim...
A coalition of Internet companies formed in the wake of February's devastating denial-of-service attacks will offer a glimpse today of the work they've done to stop a repeat of the assault that brought down key sites across the Web, including those run by giants Amazon.com and Yahoo.. . .
Law-enforcement authorities are troubled by a new kind of software being released Wednesday that sounds like something out of Mission: Impossible. It can make e-mail messages self-destruct in 10 seconds.. . .
Network ICE has released the source code to Altivore, its new e-mail sniffing program. Greg Gilliom, the firm's CEO, told Newsbytes that the software is a potential alternative for Internet service providers (ISPs) which do not want to install Carnivore, the . . .
The computer security industry, governments, patent and regulatory bodies, and consumers have moral and social obligations to work together to tackle the issues that are preventing a streamlined environment for electronic commerce. That's the opinion Fran Rooney, chief executive of Irish . . .
This is a general introduction to VPNs, including information on why they're used, architecture decisions, and more. A Virtual Private Network is a secured network connection between an individual and a private network (client-to-server) or a remote LAN and a private . . .
Every season yields a bumper crop of computer security stories: break-ins, new vulnerabilities, new products. But this season has also given us a crop of stories about computer security philosophy. There has been a resurgence in opposition to the full disclosure . . .
You've got a sound security setup, with firewalls, intrusion detection, authentication and authorization -- the gamut. Still, one day you find that valuable data is missing from a corporate server. You have no idea whether it's in the hands of an external hacker or a malicious insider. Now what do you do? . . .
The SANS Institute revealed Tuesday that the top computer security concerns of 56 federal executives and administrators are: systems being used to attack other agencies' systems; computers being taken off-line for weeks because of hacker-caused corruption; and hackers changing data on . . .
Network ICE is disclosing the source code to a new e-mail sniffing program called "Altivore." This software provides a potential alternative to ISPs who do not want to install the FBI's secretive black-box known as "Carnivore." Altivore will allow ISPs to respond to court ordered e-mail surveillance without FBI help, thus allowing them to be self-regulated instead of government regulated.. . .
There are plenty of options for user authentication, but none is a "one-size-fits-all" solution. With so many available technologies, how do you select the right one for your organization's needs? "Systems architects sometimes get stuck on security planning, because it's hard . . .
Security experts have uncovered a new class of vulnerabilities in Unix and Linux systems that let attackers take full control of computers. These "format string" vulnerabilities started surfacing about two months ago, said Elias Levy, a moderator of the Bugtraq . . .
Computer security is difficult to achieve. It requires constant vigilance, and it involves inconvenience. Sometimes, expensive products are offered that are claimed to solve your security problems with no problems, and they do not deliver. However, there are a number of . . .
It could almost be a film script. The Federal Bureau of Investigation (FBI) is attacked by hackers who wreck havoc by flooding its website with false requests and bring it to a standstill. Yet this is what happened earlier this year. . . .
If the U.S. Patent Office does what it has said it will do, companies using the Internet for computer-to-computer international trade will have to pay a royalty fee to Ed Pool. Mr. Pool, 45 years old, hails from this tiny lakeside . . .
This is part two that discusses many of the most significant events in e-commerce history. Read Part One first. "From the first electronic business transactions to heartstopping e-tail sales figures, e-commerce burst onto the scene in dramatic . . .
It has long been held that, in terms of a threat to IT systems, the protagonist would be an individual, skilled and knowledgeable, but at odds with the society surrounding them: typically, a college-educated, twenty-something male who found the challenge of . . .
Apache comes with built-in mechanisms for logging activity on your server. In this series of articles, I'll talk about the standard way that Apache writes log files, and some of the tricks for getting more useful information and statistics out of . . .
Virtual private networks merge IP technology with encryption to offer significant cost savings on WAN traffic.Sure you want a VPN. It can save you money. It can give you a better-meshed network. It can let more people share your enterprise resources . . .
Erick Lee writes: "Is a firewall enough to provide security to your network? The answer is no. A common misconception is that firewalls recognize attacks and block them. In fact, firewalls perform only limited, specific functions in network security." . . .
In this article, I start by discussing the weaknesses of each of the these absolutely horrid protocols. I then introduce secure shell (ssh) and provide an in-depth guide to using it. Before some of you write this off, realize that if . . .