Network Access Control


Linux crash on a Plane!

June 08, 2010 Added by:shawn merdinger

I don't travel nearly as as much as I used to, yet when I do I always keep a sharp eye out for the technical glitches in devices around me in travel environments.  What can I say?  It provides me endless amusement. While Linux boxes crashing in airlines' on-board entertainment systems are nothing new, and several photos exist on the Internet depicting these crashes, I'm seeing so...

Comments  (1)


Films that needed better infosec

May 16, 2010 Added by:Javvad Malik

Many times its difficult to illustrate the benefits of following good information security advice. Company's tend to keep quiet about their failings so there are few case study's available to analyse. But not to fear, the cynic has improvised and analysed 8 movies whose entire outcomes could have been changed had some simple infosec guidelines been adhered to.

Comments  (5)


Policing Dirty Networks & Applications - Using the OSI model to fault find network and applications

May 11, 2010 Added by:John England

I've just read a nice blog from Ray Tan on the importance of the OSI model, and how theory should map to practise. I for one am an advocate of this, and I thought I would share my little common sense system for logical fault finding based on a shortened version of the OSI model. One to share with the less enlightened!

Comments  (1)


Biometrics: Where do we stand?

April 16, 2010 Added by:Aaron Simmons

New Hampshire recently voted down the bill (HB 1409) and sided with the Security Industry to allow Biometrics.  So now that security is becoming a priority, where does it stand in the role of Authentication Verification? There are several methods for verification, (Biometric, PIN, Token and even Telephone Call Back/SMS).  Each one of these has its pro’s ...

Comments  (2)


Hacktivist Tactics Raise Ethical Questions

January 27, 2010 Added by:Anthony M. Freed

Recently we have witnessed the emergence of international hactivist and vigilante “the Jester” through his crusade against jihadi and militant Islamic networks...Jester’s activities raise an important question:  Where do cyber vigilantes fall on the infosec ethics spectrum?

Comments  (19)


Is the Recent Chinese Google Hack the most Serious Privacy Breach of the Year?

January 21, 2010 Added by:Brent Carey

Last week Google announced that it was the victim of a hack in China. Word of the attack spread quickly and the German, French and Australian governments issued warnings about using internet Explorer. I'm amazed that this incident has not received more commentary from the privacy and security communities. Is this not   the most serious data privacy breach in a search engine’s histo...

Comments  (1)

Page « < 27 - 28 - 29 - 30 - 31 > »