Security Corner:

April, 2008

1

April 27, 2008  4:29 PM

Your Wallet is the Best Password Manager

Ken Harthun Ken Harthun Profile: Ken Harthun

Although I use them for sites that don't require much security, password managers are something I generally stay away from. Why? Because they store the information on my hard drive or a website, both of which could be compromised by a determined hacker. Even a relatively unsophisticated hacker...

April 27, 2008  4:02 PM

If Your Laptop is Stolen, Will Your Identity be Stolen?

Ken Harthun Ken Harthun Profile: Ken Harthun

We frequently hear news of a laptop holding sensitive information having been stolen. Bad in itself, but the reports often note that the information was unencrypted. Doubly bad. The news rarely focuses on personal laptop thefts, however because there's no news value in reporting the loss of Joe...


April 17, 2008  7:05 PM

Top Five Personal Firewalls

Ken Harthun Ken Harthun Profile: Ken Harthun

How well does your personal firewall protect you? GRC's Leak Test, PCFlank, and Bob Sundling's


April 15, 2008  1:45 PM

Tighten Security With Your Hosts File

Ken Harthun Ken Harthun Profile: Ken Harthun

Using a HOSTS file to block access to malicious or unwanted web sites is an old trick and it's excellent protection against malware. I've been using the mvps.org hosts file for about five years, and I have...


April 9, 2008  9:11 PM

How to Prevent DNS Rebinding Attacks

Ken Harthun Ken Harthun Profile: Ken Harthun

There's nothing new about the DNS rebinding attack, but it's in the news again. Dan Kaminsky, Director of Penetration Testing for


April 7, 2008  8:46 PM

Make Your Own Paper Enigma Machine

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

The Enigma cipher machine was a very cool electromechanical device for producing polyalphabetic...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


April 4, 2008  8:13 PM

Are You a Security “No” Man or a Security “Yes” Man?

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

We security wonks always seem to be put into a position of having to say "no." That makes us unpopular with the I'm-not-hurting-anything crowd who insist on checking their webmail, IMing their friends, and running assorted and sundry downloaded and web-based applications (but only on their time, of...


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: