Home > Articles > Security > General Security and Privacy

General Security and Privacy

178 Items

Sort by Date | Title

Locking Down a Shared or Public PC with SteadyState
Aug 28, 2009
Eric Geier helps you discover how the free Microsoft SteadyState utility can help secure and manage a multiuser PC.
Lottery and Contest Scams
Jun 4, 2008
Everyone loves to win a prize. As a result, phony prize scams are rampant. Steve Weisman shows you some of the common ones and how to avoid them.
Managing Your Computer and Internet Passwords
Aug 27, 2013
Michael Miller shows you how to create more secure passwords - and how to remember and manage them all.
Musings on Personal (and SOHO) Firewalls
Nov 2, 2001
Want to keep your cable modem or DSL connection safe and secure? Ed Tittel gives you the low-down.
Night of the Living Wi-Fi's (A Security Parable for Our Times)
Apr 5, 2002
Ed Skoudis' true-to-life scenario sends chills up the spine of any business with employees using unsecured wireless access.
No Time to Patch
Sep 5, 2008
Randy Nash discusses the problems of exploits and malicious code and offers some suggestions to reduce the time to patch these vulnerabilities.
Online Security: A Quest to Be One Step Ahead of the Bad Guys
May 29, 2009
Linda Leung interviews security expert Jamey Heary about network security and the world of "white hats" versus "black hats."
Pandemic Outbreak and the Impact of Quarantine on Business Operations
Dec 7, 2007
Randy Nash looks at the historical impact of pandemic outbreaks, the preparation and planning that has taken place, and the potential impact that could be expected.
Passwords: So Important, Yet So Misused
May 1, 2009
Microsoft MVP and CISSP-ISSAP John Traenkenschuh illustrates basic password best practices.
Perception of Security Risk: Fear, Uncertainty, and Doubt
Jul 28, 2008
Why do so many security product vendors use it as part of the sales pitch? As Randy Nash explains, because it works.
PKI: Broken, But Fixable
Nov 30, 2011
The public key infrastructure (PKI) used for securing the Web has recently been found to be much less secure than was previously thought. David Chisnall discusses some of the flaws in the design and some potential solutions.
Preparing for a FISMA Security Audit
Nov 16, 2007
How do you prepare for an audit, and what do you do when the findings are issued? Randy Nash examines how to survive the audit gauntlet.
Prevent Wi-Fi Eavesdroppers from Hijacking Your Accounts
Sep 20, 2011
Eric Geier shows you how to protect your privacy when logging on to online accounts that don't always use secure connections, like Facebook, MySpace, Twitter, and Amazon.
Privacy Organizations and Initiatives
Apr 12, 2002
Find out how some organizations are fighting to protect your right to privacy, even as technology becomes steadily more invasive.
Protecting Web Sites by Guarding the Exits
Jun 22, 2001
Security expert Avi Rubin suggests we protect web servers the way some department stores protect against shoplifters: Watch the exits.
Protecting Your Network from the Wi-Fi Protected Setup Security Hole
Mar 12, 2012
Even if you’ve encrypted and secured your wireless network with Wi-Fi Protected Access (WPA or WPA2), a security hole affecting most wireless routers may make it fairly easy for those with the right tools to hack your network and connect. Eric Geier shows how to prevent this and protect your network.
Recovering and Securing Network and Internet Passwords
Oct 8, 2012
Security expert Eric Geier shows you how to find or capture your network, browser, and email passwords, which is useful if you’ve forgotten them. Plus, he explores password vulnerabilities and teaches you how to protect against them.
Safety First on craigslist
Oct 22, 2008
This chapter shows you how to protect yourself when using craigslist.
Scanning Tools: How Many Do We Really Need?
Feb 8, 2008
Randy Nash shares his opinion on the need for scanning tools.
Score List Hacking: Lessons Learned by Cheating Your Way to Number One, Part 2 of 2
Aug 5, 2005
It's bad enough that a score list hacker can thwart genuine users in their attempts to beat your game's high scores. Even worse, the hacker can create havoc on your computer, hijack it for his own personal use, or something even more nefarious. Seth Fogie concludes this series with a pointed discussion of the hazards of leaving your game unprotected and ways to prevent score list hacking. If you've never seen a covert score list chat channel, this is worth a read!

<< < Prev Page 2 3 4 5 6 Next >