Security Corner:

Networking

1

April 7, 2008  8:46 PM

Make Your Own Paper Enigma Machine

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

The Enigma cipher machine was a very cool electromechanical device for producing polyalphabetic...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

April 4, 2008  8:13 PM

Are You a Security “No” Man or a Security “Yes” Man?

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

We security wonks always seem to be put into a position of having to say "no." That makes us unpopular with the I'm-not-hurting-anything crowd who insist on checking their webmail, IMing their friends, and running assorted and sundry downloaded and web-based applications (but only on their time, of...


March 24, 2008  9:06 PM

Encrypt, You Must, But Do It Right!

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

EncryptionOne of the clients I service has information that falls under HIPAA. Prior to last week, all of the data was stored on a server located behind a strong firewall in a building with good...


March 20, 2008  1:23 AM

Paranoid About Hard Drive Security? Try This

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

My company serves as the IT department for several medical, legal, social service, and banking organizations in our area. I don't have to tell you that every one of these organizations deals with information that falls under various government data security and privacy acts. Every one of these...


February 24, 2008  1:07 AM

Can a Criminal Hacker Guess Your Password?

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

In my last post, I stressed the importance of changing the default username and passwords of all configurable network devices. That’s good advice. But a weak password, one that is easily...


February 20, 2008  9:12 PM

Omit This Setup Step and Your Router Can Be Easily Compromised

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

Last time, I stressed having a NAT router--or router/firewall--between your PC and the Internet as a first line of defense. This is without question the first, most important security step, but it can be useless unless you have it properly configured; in fact, omitting one crucial first step can...


February 16, 2008  8:02 PM

How Not to Invite Attackers into Your PCs or Network – the First Line of Defense

Ken Harthun Ken Harthun Profile: Ken Harthun
Networking

The other day, I gave you what I consider to be the most basic security maxim, one on which I base all of my security practices: The best security measures are completely useless if you invite attackers into


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: