Security Corner:

Security practice


November 24, 2009  3:44 AM

Golden Rule #2: How Not to Invite Attackers into Your PCs or Network – the First Line of Defense



Posted by: Ken Harthun
14 Golden Rules of Computer Security, NAT, Routers, Secure Computing, Security, Security practice

Golden Rule #1 gives what I consider to be the most basic security maxim, one on which I base all of my security practices, so let me repeat: The best security measures are completely useless if you invite attackers into your PCs or networks. Windows users will...

November 24, 2009  3:30 AM

Golden Rule #1: Don’t Invite Attackers into Your PCs or Networks



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Security, Security practice

Having worked in IT in various capacities since the early 1980’s, I’ve seen the need for security evolve from simple protection against viruses to the need for complex security policies designed to combat multiple attack vectors. These days, it takes constant vigilance to stay ahead of criminal...


November 24, 2009  3:19 AM

Preface to 14 Golden Rules of Computer Security



Posted by: Ken Harthun
14 Golden Rules of Computer Security, Security, Security practice

It isn’t getting any...


November 24, 2009  3:12 AM

Series Release: 14 Golden Rules of Computer Security



Posted by: Ken Harthun
Security, Security practice

My new...


October 15, 2009  3:18 AM

Convert a USB Thumb Drive into a ROBAM



Posted by: Ken Harthun
ROBAM, Secure Computing, Security, Security policy, Security practice

What's a ROBAM? you ask. Check out this post: Protecting Your Business from Online Banking Fraud. SANS says, "The number one recommended...


October 15, 2009  2:42 AM

How to Make a USB Thumb Drive Laptop Theft Alarm



Posted by: Ken Harthun
physical security, Security practice, Security tools, Theft alarm, USB thumb drive, Utilities

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 16, 2009  8:28 PM

Hacker HighSchool is a Great Idea!



Posted by: Ken Harthun
education, Hacking, security awareness, Security practice

Steve Gibson of Spinrite and Security Now! podcast fame talked about Hacker HighSchool in his most recent

Bookmark and Share     0 Comments     RSS Feed     Email a friend


July 10, 2009  8:30 PM

“I guess I forgot to lock the door.”



Posted by: Ken Harthun
Intrusion detection, physical security, Security, Security practice

Physical security is something we often take for granted, but it can be just as important as cyber security. One of my clients recently called to say that some suspicious files had suddenly appeared on one of their servers. Naturally, I investigated, but I couldn't find any breach in the firewall...


April 29, 2009  12:33 AM

10 Immutable Laws of Security Administration



Posted by: Ken Harthun
Secure Computing, Security, Security management, Security policy, Security practice

My last post on this subject discussed the 10 Immutable Laws of Security. This one takes the next step--also a Microsoft "archived" essay, but still relevant today. These are so self-evident that...


April 15, 2009  8:13 PM

10 Immutable Laws of Security



Posted by: Ken Harthun
Secure Computing, Security, Security management, Security policy, Security practice

I search the web constantly for security-related news and content. One day last month, I came across a series of articles on TechNet buried in the archive. Microsoft prefaces the articles with this statement: "Archived content. No warranty is made as to...


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: