November 9, 2009  1:27 AM

Javascript Must Die!

Posted by: Ken Harthun
Exploits, insecure, javascript, Opinion, Security, Vulnerabilities

At least that's what Mr. John Graham-Cumming says on his blog--and what he told attendees at Virus Bulletin 2009 in his presentation called, "

November 9, 2009  12:56 AM

If You Never Get on the Internet, You’ll Never Have a Problem

Posted by: Ken Harthun
Opinion, Security

So, if all you need to do with your PC is write documents that you're going to print out locally or balance your checkbook with information that you've input offline, you should be safe, right? Wrong. Did you bring home anything from the office, like on a thumb drive, or on an - now obsolete -...

September 9, 2009  8:09 PM

President Obama’s Back-to-School Speech: My Advice

Posted by: Ken Harthun
IT careers, Opinion, President Obama, Security, Security management

Yesterday, Michael Morisy, ITKnowledgeExchange’s community editor, posted “President Obama’s back-to-school speech tells...

Bookmark and Share     0 Comments     RSS Feed     Email a friend

August 31, 2009  2:05 AM

14 Golden Rules of Computer Security

Posted by: Ken Harthun
Opinion, Secure Computing, Security, Security management, Security maxim, Security tools

In celebration of (almost) being close to releasing my first eBook to the general public, I’m releasing the list of the 14 Golden Rules of Computer Security in hopes that any last minute errors will be spotted by my peers here at IT Knowledge Exchange. Here’s the list:

#1: The best...

August 24, 2009  1:40 AM

Un-guessable Passwords—How to Make Them

Posted by: Ken Harthun
Opinion, Password, Secure Computing, Security, Security management

The sheer number of passwords most of us have is a big problem. Even if we have hints written down, how do we know which one created the password for which login? It would appear as though we're back to writing them down or using a password manager. Don't worry, though. Here's how to create...

August 16, 2009  9:51 PM

Is Linux Security as Bad as Microsoft Windows “Security?”

Posted by: Ken Harthun
Attack Surface, Critical update, insecure, Linux, Opinion, Security, Vulnerabilities

Linux proponents often gloat over the seeming lack of security vulnerabilities in the Linux kernel when compared to Microsoft Windows; Windows proponents counter saying that Linux is just enjoying “security through obscurity.” Seems the Windows people may be justified to some degree as...

June 30, 2009  3:19 PM

Panda’s Cloud Antivirus (Beta) is a Winner!

Posted by: Ken Harthun
Anti-malware, Anti-virus, Cloud Computing, Opinion, Panda Security, Software

I've been using Panda Security's free Cloud Antivirus for awhile and I must say I'm impressed. It's there, but you'll never know it unless you look (the little panda icon in the system tray). I rarely get...

May 31, 2009  7:38 PM

Are YOU a Hacker?

Posted by: Ken Harthun
Cybercrime, Hacking, Opinion, Security

Are you? It’s not necessarily a derogatory term. Neither is “geek.” But what does “hacker” really mean? Here’s one opinion:

Someone that is...

May 31, 2009  6:56 PM

Search for Screensavers at Your Own Risk

Posted by: Ken Harthun
Browsers, Firefox, Internet Explorer, Malware, Microsoft, Microsoft Windows, Opinion, Secure Computing, Security

Enter “screensavers” into any major search engine and there’s better than a fifty percent chance that any result you click on will land you on a malicious website. According to McAfee’s recently released report “

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: