Security Corner:

Secure Computing


February 26, 2010  2:23 AM

Simple Security



Posted by: Ken Harthun
Opinion, Rant, Secure Computing, Security

Complexity, they say, is the enemy of security. Actually, I think it was Bruce Schneier who I first heard it from. It has come to be one of those "everybody knows" things, however, so it's irrelevant who first said it. Nevertheless, it's true. The more complicated the software, device, or campus,...

February 18, 2010  2:30 AM

Anonymity and the Internet



Posted by: Ken Harthun
anonymity, Internet, onion routing, Secure Computing, Security, Security policy

Bookmark and Share     0 Comments     RSS Feed     Email a friend


February 17, 2010  3:28 AM

Mozilla Alert About Sothink Was False Positive



Posted by: Ken Harthun
Malware, Opinion, secure coding, Secure Computing, Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


February 10, 2010  9:25 PM

Software for Secure Computing: LastPass



Posted by: Ken Harthun
password manager, Secure Computing, Security, Software for Secure Computing

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 24, 2009  2:31 PM

Web 2.0 Security: Impersonation & Targeted Personal Attacks



Posted by: Ken Harthun
Secure Computing, security awareness, Security practice, Web 2.0 Security

Bookmark and Share     0 Comments     RSS Feed     Email a friend


December 8, 2009  9:12 PM

Golden Rule #11: TSL/SSL is Your Friend and Protector on the Web



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Secure Computing, Security, Security practice

I...


December 5, 2009  6:20 PM

Golden Rule #9: Two Ways to Operate Securely on the Web



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Secure Computing, Security, Security practice

Bookmark and Share     0 Comments     RSS Feed     Email a friend


November 24, 2009  3:44 AM

Golden Rule #2: How Not to Invite Attackers into Your PCs or Network – the First Line of Defense



Posted by: Ken Harthun
14 Golden Rules of Computer Security, NAT, Routers, Secure Computing, Security, Security practice

Golden Rule #1 gives what I consider to be the most basic security maxim, one on which I base all of my security practices, so let me repeat: The best security measures are completely useless if you invite attackers into your PCs or networks. Windows users will...


October 20, 2009  12:12 AM

Acrobat Reader Users Should Switch to Foxit Reader, Shrink Their Attack Surface



Posted by: Ken Harthun
adobe reader, bloatware, Foxit Reader, insecure, Secure Computing, Security

I'm not going to rant, I promise--I don't have to because this doesn't affect me. Several years ago, I abandoned the bloated, insecure and extremely resource-intensive Acrobat Reader in favor of the smaller and more secure Foxit Reader....


October 19, 2009  11:34 PM

Trust Only https:// on Form Pages



Posted by: Ken Harthun
Encryption, Secure Computing, Security, SSL

How often, when you log into a site that requires a username and password, to you check to see if the connection is secure? You probably don't give it a second thought. Most people don't. For many sites, like newspapers, online magazines, etc., it probably doesn't matter much. Who cares if someone...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: