Security Corner:

April, 2008


April 27, 2008  4:29 PM

Your Wallet is the Best Password Manager

Posted by: Ken Harthun
Browsers, Password, Security, Security management

Although I use them for sites that don't require much security, password managers are something I generally stay away from. Why? Because they store the information on my hard drive or a website, both of which could be compromised by a determined hacker. Even a relatively unsophisticated hacker...

April 27, 2008  4:02 PM

If Your Laptop is Stolen, Will Your Identity be Stolen?

Posted by: Ken Harthun
Encryption, Mobile, Portable computing, Security, Security maxim

We frequently hear news of a laptop holding sensitive information having been stolen. Bad in itself, but the reports often note that the information was unencrypted. Doubly bad. The news rarely focuses on personal laptop thefts, however because there's no news value in reporting the loss of Joe...

April 17, 2008  7:05 PM

Top Five Personal Firewalls

Posted by: Ken Harthun
Firewalls, HIPS, Instrusion prevention, Intrusion detection, Security, Vulnerabilities

How well does your personal firewall protect you? GRC's Leak Test, PCFlank, and Bob Sundling's

April 15, 2008  1:45 PM

Tighten Security With Your Hosts File

Posted by: Ken Harthun
Browsers, Microsoft Windows, Networking, Security

Using a HOSTS file to block access to malicious or unwanted web sites is an old trick and it's excellent protection against malware. I've been using the hosts file for about five years, and I have...

April 9, 2008  9:11 PM

How to Prevent DNS Rebinding Attacks

Posted by: Ken Harthun
Browsers, Firewalls, Networking, Password, Routers, Security

There's nothing new about the DNS rebinding attack, but it's in the news again. Dan Kaminsky, Director of Penetration Testing for

April 7, 2008  8:46 PM

Make Your Own Paper Enigma Machine

Posted by: Ken Harthun
Cryptography, Encryption, Security

The Enigma cipher machine was a very cool electromechanical device for producing polyalphabetic...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

April 4, 2008  8:13 PM

Are You a Security “No” Man or a Security “Yes” Man?

Posted by: Ken Harthun
Networking, Opinion, Security, Security management

We security wonks always seem to be put into a position of having to say "no." That makes us unpopular with the I'm-not-hurting-anything crowd who insist on checking their webmail, IMing their friends, and running assorted and sundry downloaded and web-based applications (but only on their time, of...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: