The Presidential Blackberry. Wouldn’t you love to get a glimpse of what’s on it? That’s precisely the problem, former White House Deputy Chief of Staff Joe Hagin told Murdok. While President Bush travels generally incommunicado–that is, unthinkably for most us, sans mobile phone–the President-Elect is in a very public argument for retention of his pre-election smart phone.
ASP.NET: Securing ViewState Efficiently
Even though ViewState is unreadable by the human eye, it is nothing but a base64 encoded string that easily decodes by a piece of software like this one.
Microsoft Securing Its Own Software
Software leviathan Microsoft aims to produce a product in 2005 that will offer a protective barrier against spyware, viruses and rootkits. This test product, Microsoft Client Protection, will provide protections for business file servers, desktops and laptops against the traditional enemies of the computer world.
Lockheed Martin Securing NYC MTA
A $212 million USD contract will see the defense contractor conduct a massive upgrade of the electronic security operations in place.
Securing Second- and Third-Round Venture Capital Financing
Widget sales are booming – the competition is scrambling, demand is up, and the books are finally treading water. Your core management team has big ideas for the future of Widget Inc. Opportunity is abundant; but how will you fund that next big leap?
Securing Second- And Third-Stage Venture Capital Financing
Widget sales are booming – the competition is scrambling, demand is up, and the books are finally treading water. Your core management team has big ideas for the future of Widget Inc. Opportunity is abundant; but how will you fund that next big leap?
Securing wVoIP
Wireless security software developer Columbitech recently announced wireless VPN support for securing wireless voice applications (wVoIP).
Securing Your Wireless Home Network
Do you have a wireless network installed in your home? Chances are that you do. If so, did you know that hackers might be using your Internet connection without your knowledge or consent?
Securing POP mail access in MacOSX
I always worry about my website. Security is serious stuff, and you really can’t be too careful. I don’t enable telnet, rlogin and use long, complicated passwords with ssh and so on. I use a shared webserver (http://www.interland.com) that allows me virtual root access, and I fortunately don’t have to worry about things like sendmail; Interland keeps on top of that sort of thing for me.
Securing Network Resources
Network attacks are the biggest risk for Windows 2000 servers. Since the release of the old Windows NT 3.1, hackers have been actively looking for bugs in Microsoft Windows operating systems. Tools like SecHole, IISInjector, NAT (NetBIOS Auditing Tool), SMBRelay and L0pthcrack have been developed to reveal passwords, execute actions on a server, forge network connections and degrade system performance. In addition, several critical security vulnerabilities have been recently released for Windows 2000 that can completely expose a network to an intruder.