Security Corner:

Security maxim


September 30, 2009  9:43 PM

Security Maxims of a Different Breed



Posted by: Ken Harthun
cyber security, Humor, physical security, Security, Security management, Security maxim, Security policy

Search for "computer security maxims" on any of...

August 31, 2009  2:05 AM

14 Golden Rules of Computer Security



Posted by: Ken Harthun
Opinion, Secure Computing, Security, Security management, Security maxim, Security tools

In celebration of (almost) being close to releasing my first eBook to the general public, I’m releasing the list of the 14 Golden Rules of Computer Security in hopes that any last minute errors will be spotted by my peers here at IT Knowledge Exchange. Here’s the list:

#1: The best...


August 19, 2009  2:04 AM

Passwords, Again



Posted by: Ken Harthun
Hacking, Microsoft Windows, Password, Secure Computing, Security, Security maxim

The Sydney Morning Herald reports, “Hackers break into police computer as sting backfires:”

An Australian Federal...


July 22, 2008  12:26 AM

If Spam Has You Irate, Obfuscate!



Posted by: Ken Harthun
Email security, Opinion, Security, Security maxim

Spam email is not only a nuisance, it's a security risk. Most of the viruses, worms, and trojans floating around these days are transmitted in one form or another via spam. The threat can be attached directly to the email or it can rely on some subterfuge to get a clueless victim to click on a link...


June 20, 2008  1:02 AM

WiFi Security–The Only Way is WPA



Posted by: Ken Harthun
Cryptography, Encryption, Password, Security, Security management, Security maxim, Wireless

Please note: since this article was posted, WPA-TKIP has been found to be vulnerable. See my post of 2008.11.13 entitled "WPA-TKIP Vulnerable to Attack" for more...


June 14, 2008  1:57 PM

Infected PC? Don’t Just Clean–Wipe and Reload



Posted by: Ken Harthun
Anti-malware, Malware, Opinion, Rootkit, Security, Security maxim

You've seen them: PCs with serious malware infections that seem to defy any and all attempts to clean them up. You persevere and eventually get rid of the files that regenerate upon deletion, clean up the autorun registry entries that keep the malware going, and kill all the malicious processes...


June 13, 2008  1:56 AM

SSL is Your Friend and Protector on the Web



Posted by: Ken Harthun
Cryptography, Phishing, Security, Security maxim

I hope I've given you some valuable advice in this series of posts on how to secure your computer. If so, and if you've chosen to take my advice, you’re probably careful about what you do on the web. You certainly have strong passwords for all of your logins, all of them different, and you...


May 31, 2008  2:13 AM

How to Secure Your Computer: Maxim #10



Posted by: Ken Harthun
Cryptography, Encryption, Password, Security, Security management, Security maxim

A friend of mine came up to me the other day and said, “I love your computer security maxims, but there's one thing I don’t have anything to worry about–I keep all of my passwords stored on an encrypted thumb drive.” "Well, that’s a good thing," I said. "Where do you keep your...


May 17, 2008  3:08 PM

Two Ways to Operate Securely on the Web



Posted by: Ken Harthun
Browsers, Linux, Microsoft Windows, Security, Security management, Security maxim, Virtualization

If you've done any coding at all, you probably have a good idea why software developers often run their untested code in a protected environment--a sandbox. If the software misbehaves, all you have to do is shut...


May 1, 2008  1:16 AM

Does Encryption Have You Complacent About Physical Security?



Posted by: Ken Harthun
Mobile, Security, Security management, Security maxim

There's no question that data security is senior to physical security. The real value in a stolen laptop or PC isn't in the hardware, it's in the data. Sure, some druggie might steal your laptop and sell it for a fix, but the real danger lies in the thief who knows the value of the files that are...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: