Security Corner:

February, 2008


February 29, 2008  2:32 AM

The Unsolved D’Agapeyeff Cipher

Posted by: Ken Harthun
Cryptography, Encryption, Security

Sometimes, it's a good thing to take a breather from the routine, to venture off into something more fun than the serious day-to-day concerns of network and computer security. One of my interests is cryptography, especially its history, and I love to play around with cryptograms in the daily...

February 28, 2008  1:30 AM

If You’re Not Patched, You’re a Target!

Posted by: Ken Harthun
Security, Security maxim, Vulnerabilities

OK. So you've installed a NAT router, you've changed the default login and passsword, and you've used an unguessable password. You've done everything right so far. However, you still may be vulnerable; in fact, you probably are, even if you keep your operating system patched. In a

February 24, 2008  1:07 AM

Can a Criminal Hacker Guess Your Password?

Posted by: Ken Harthun
Networking, Password, Security, Security maxim

In my last post, I stressed the importance of changing the default username and passwords of all configurable network devices. That’s good advice. But a weak password, one that is easily...

February 20, 2008  9:12 PM

Omit This Setup Step and Your Router Can Be Easily Compromised

Posted by: Ken Harthun
NAT, Networking, Routers, Security, Security maxim

Last time, I stressed having a NAT router--or router/firewall--between your PC and the Internet as a first line of defense. This is without question the first, most important security step, but it can be useless unless you have it properly configured; in fact, omitting one crucial first step can...

February 16, 2008  8:02 PM

How Not to Invite Attackers into Your PCs or Network – the First Line of Defense

Posted by: Ken Harthun
Firewalls, NAT, Networking, Security, Security maxim

The other day, I gave you what I consider to be the most basic security maxim, one on which I base all of my security practices: The best security measures are completely useless if you invite attackers into

February 13, 2008  7:28 AM

Introduction to Security Corner

Posted by: Ken Harthun
Security, Security maxim

Hello! The good folks at IT Knowledge Exchange and TechTarget have granted me the privilege of sharing my views on computer and network security with you. I'm proud to...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: