Items Tagged with "Access Control"


16443e0c6f6e4a400fd0164b3c406170

Good Reasons to Lock Down Your Wireless Network

September 05, 2010 Added by:Christopher Burgess

Anyone in proximity to your business, home or office may be within the exploitable footprint of Wi-Fi signal, they can collect your SSID and MAC addresses, and if your network is not secured, their odds of being able to collect information traversing the connection increases exponentially...

Comments  (4)

E313765e3bec84b2852c1c758f7244b6

Passwords, Dinosaurs, and 8-Track Tapes

August 30, 2010 Added by:Brent Huston

It’s not just a matter of people using short, simple, stupid passwords any more. With advances in easily available and cheap computing power such as advanced graphics processors and solid state drives, even long and complex passwords can be cracked in seconds...

Comments  (2)

46d1980e375ce08915b30d9a328c2fdc

Extensive User and Group Privileges

August 16, 2010 Added by:Application Security, Inc.

The process of collecting a comprehensive list of all rights that a user has can become a daunting task. Privileges aren't typically just assigned directly to the users they also inherit privileges from groups or roles they belong to...

Comments  (0)

F6bae6ee0c7dfe5b62860cc8ebf311fe

Boole server - Data centric remote access, auditing and encryption

December 09, 2009 Added by:John England

Maintaining confidentiality and protection of data from unauthorized access are basic requirements for a security system. Boole Server is able to fulfil these protection requirements to a very high standard. Ease of use and versatility in configuration enables Boole Server to be the development platform delivering all the tools necessary for the complete protection of information circu...

Comments  (0)


From the Web

Laissez-Faire Access Control

November 09, 2009 from: hackyourself.net

When organizations deploy file systems with access control mechanisms that prevent users from reliably sharing files with others, these users will inevitably find alternative means to share. Alas, these alternatives rarely provide the same level of confidentiality, integrity, or auditability provided by the prescribed file systems. Thus, the imposition of restrictive mechanisms and policies by sys...

Comments  (0)

Page « < 9 - 10 - 11 - 12 - 13 > »