Security Corner:

February, 2010

February 28, 2010  10:45 PM

When “Security” Becomes Onerous

Posted by: Ken Harthun
Big Brother, Privacy, Security, Surveillance

If you can even call...

February 27, 2010  2:02 AM

Waledac is Now Virtually Headless

Posted by: Ken Harthun
Botnet, cyber security, Microsoft, spam, spambot, Waledac

[caption id="attachment_594" align="alignleft" width="285" caption="Waledac Infections Worldwide"]

Bookmark and Share     0 Comments     RSS Feed     Email a friend

February 26, 2010  2:23 AM

Simple Security

Posted by: Ken Harthun
Opinion, Rant, Secure Computing, Security

Complexity, they say, is the enemy of security. Actually, I think it was Bruce Schneier who I first heard it from. It has come to be one of those "everybody knows" things, however, so it's irrelevant who first said it. Nevertheless, it's true. The more complicated the software, device, or campus,...

February 24, 2010  3:24 AM

A Tale of Two PCs

Posted by: Ken Harthun
insecure, Internet Explorer, Patch management, Security, Security practice

Bookmark and Share     1 Comment     RSS Feed     Email a friend

February 21, 2010  11:48 PM

Security on Public PCs – NOT!

Posted by: Ken Harthun
Public Computers, Security, security awareness, Security Now!, Security practice

Sorry. There's nothing you can do to make a public computer safe. I've had family members ask me if it's OK, while their computer at home is down (due to spyware, adware and viruses, mind you) if they can go to the library and pay their credit card bills, check their bank accounts, etc.? OMG!...

February 21, 2010  3:54 AM

Humor: Operation Mandatory Patriotic Tattoo

Posted by: Ken Harthun
Security Humor

If you're not familiar with you're missing out on some great political humor. Check out Operation Mandatory Patriotic Tattoo. Here's an exerpt:


February 20, 2010  4:00 PM

Software for Secure Computing: LockNote

Posted by: Ken Harthun
Encryption, Security, Software for Secure Computing

Steganos GmbH (Germany) provides LockNote for free so you can encrypt sensitive information in text files. LockNote is open source and is based upon open source technologies, e.g. the certified CryptoPP program library for strong encryption. The...

February 20, 2010  2:42 AM

Video: Chromium OS Security

Posted by: Ken Harthun
Browsers, Chromium OS, Google, Security, Video

Google Chrome OS is an open source operating system for people who spend most of their time on the web built around the core tenets of speed, simplicity and security. Now this is the way it should be done.


February 18, 2010  2:30 AM

Anonymity and the Internet

Posted by: Ken Harthun
anonymity, Internet, onion routing, Secure Computing, Security, Security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend

February 17, 2010  3:28 AM

Mozilla Alert About Sothink Was False Positive

Posted by: Ken Harthun
Malware, Opinion, secure coding, Secure Computing, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: