Security

toggle-button

Encryption is Not Enough

A few facts

Inconvenient fact #1 - Cryptography is harder than it looks: Not just any encryption program will do.  Most any competent programmer could grab the open-source code for a block cipher (cryptographic protocol) -- say AES -- and put together an encryption process to get from password entry to ciphertext.

Article type: 

Matousec Proactive Security Challenge Analyzed

 

The following sections discuss misleading elements of a popular firewall tester in an attempt to help readers understand the meaning and limitations of its test results. Please don't take it as an attack against the independent service the website provides. I enjoy the website and praise its level of professionalism.

 

1. Overview

The scoring of the Matousec tests (as presented on its comparison table) and some of the site's claims are misleading. To simplify my article, let's consider a simple bowling analogy.

Article type: 

Safe Computing in Under an Hour

 

Safe Computing in Under an Hour

.... or the Battle of the BOTS*
*Automated internet malware programs

Yes, that's right. You too can secure your PC in under an hour simply by following the guidelines below.
 

Article type: 

Spyware Removal Guide

 
Introduction

This malware removal guide provides guidance on how to remove malware from your computer. Malware is a general name of any malicious software, including virus, trojan, worm, spyware, adware, keylogger, dialer and rootkit, that tries to damage a system, steal financial data, or perform other such malicious behaviour.

Article type: 

Eye Chart to Diagnose Conficker Virus

"Quote from Cnet"

Joe Stewart from SecureWorks has put together an effective "eye chart" that sources its graphics from sites that Conficker would block. If you can't see one or more of the images, you're either infected, or image loading in your browser has been disabled.

See Website:

Article type: 

HIPS Explained

 

This is my attempt to clarify what a HIPS is, what it does and how best to incorporate a HIPS program into your security protection.

 

What does "HIPS" mean?

It stands for Host Intrusion Prevention System. In essence it's a program that alerts the user to a malware program such as a virus that may be trying to run on the user's computer, or that an unauthorized user such as a hacker may have gained access to the user's computer.

Article type: 

Pages

Subscribe to RSS - Security