Security Corner:

Firewalls


September 4, 2010  2:12 PM

Security Online vs. Security in the Real World



Posted by: Ken Harthun
Anti-malware, Anti-virus, cyber security, Encryption, Firewalls, Intrusion detection, Intrusion prevention, physical security

Security online is analogous...

January 6, 2010  1:37 AM

ABA Recommends Using Dedicated PC for Online Banking



Posted by: Ken Harthun
Firewalls, Microsoft steady state, Online banking fraud, secrurity practice, Security, security awareness, Security policy

This is an idea that has been floating around for awhile. I recommended Convert a USB Thumb Drive into a...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


September 5, 2009  3:03 PM

Good PC Security Begins With a Baseline



Posted by: Ken Harthun
Anti-malware, Anti-virus, Browsers, Critical update, Firewalls, Malware, Microsoft Windows, NAT, Patch management, Routers, Security

I received some good feedback on my “14 Golden Rules of Computer Security” list, in particular, this comment from Michael: “…you encourage people to go through...


July 29, 2009  9:08 PM

I’ll Say it Again—Turn Off the Remote Web Management Interface!



Posted by: Ken Harthun
Embedded systems, Exploits, Firewalls, Hacking, insecure, Remote Code Execution, Security, Security management, Storage, Vulnerabilities

I don’t know how many times I’ve told people that the embedded management interface on most devices is a security breach waiting to happen. I just got wind of some news, but can’t seem to find anything more than this mention. As soon as I dig up some details, I’ll let you know. This...


August 31, 2008  9:44 PM

Software for Secure Computing: Personal Firewalls



Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, NAT, Routers, Secure Computing, Security

How to Secure Your Computer: Maxim #2 stressed the importance of using a NAT router to make your network "invisible" to...


August 5, 2008  1:01 AM

New Article Series: Software for Secure Computing



Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, HIPS, Intrusion detection, Secure Computing

I recently posted the last article in my How to Secure Your Computer series of security maxims (an eBook will be available shortly--stay tuned for details). While editing the book, I...


July 29, 2008  10:47 AM

The Lazy Man’s Way to System Security



Posted by: Ken Harthun
Anti-malware, Anti-virus, Firewalls, Malware, Routers, Security

A good many people have responded to my various articles on system security. Most of the feedback has been positive, but many wondered if there might be a simpler approach, some basic things you...


July 27, 2008  4:09 PM

Nine Steps to System Security – 2008



Posted by: Ken Harthun
Anti-malware, Anti-virus, Browsers, Email security, Firewalls, Malware, Microsoft Windows, NAT, Opinion, Phishing, Rootkit, Routers, Security, spam, Vulnerabilities

It isn’t getting any better on The Wild, Wild Web, despite state and federal government attempts to arrest and prosecute those responsible for electronically-perpetrated criminal acts. Spyware and malware of all kinds are increasingly more stealthy and difficult to remove thanks to


July 25, 2008  1:45 AM

Sure-fire Spam Zombie Killer



Posted by: Ken Harthun
email, Email security, Exchange, Firewalls, Networking, Routers, Security, spam

The other day, I got a call from one of my clients who said that their email was bouncing back from people they had always been able to send to. I investigated and found that the error message was to the effect of <hostname.domain #5.5.0 smtp;550 Blocked;Spam/Zombie address listed at...


July 19, 2008  12:58 AM

Unpatched PC “0wn3d” in Four Minutes or 16 Hours; Which is it?



Posted by: Ken Harthun
Firewalls, Malware, Microsoft Windows, NAT, Networking, Routers, Security, Vulnerabilities

I just love stories like this one. On the one hand, Internet Storm Center researchers say an unpatched PC connected to the Internet will be compromised in less...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: