Quantcast
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

10 New Immutable Laws of IT Security

Back in 2000, Microsoft released its 10 Immutable Laws of Security & 10 Immutable Laws of Security Administration. 6 Years later, these laws are still true. I recently started reading the excellent...

View Article


Image may be NSFW.
Clik here to view.

Top 20 Books Every IT Security Professional Should Own (and READ!)

I recently was asked by some colleagues how an IT admin can get into infosec. It’s a tough question for 3 reasons: 1) Most administrators are not wired to be security professionals. The goal of admins...

View Article


Image may be NSFW.
Clik here to view.

How to buy a 65” Plasma for $.99

How secure is your web application? Are you sure? We are constantly amazed at the lack of basic security many companies employ online. For instance, it has been known for years that e-commerce sites...

View Article

Image may be NSFW.
Clik here to view.

Clean Up After Terminated Windows Administrators

Losing an administrator is always a painful process. Even the best administrators usually forget to document something. The worst admins document nothing, create up multiple backdoor accounts, and...

View Article

Image may be NSFW.
Clik here to view.

OFAC Compliance, the Easy Way

Occasionally, I find a simple solution to a complex problem that works better than expected. Office of Foreign Assets Control (OFAC) compliance can be difficult. OFAC is the treasury department...

View Article


Image may be NSFW.
Clik here to view.

Lockdown Windows 2003 & XP with Simple Scripts

Now that DST 2007 is over, we are going to start a series of articles on securing systems and networks. I have built a lot of systems for various companies over the years. The challenge is to create...

View Article

Web Proxies – Surf the Net Anonymously

Today we launched our own anonymous web proxy: http://www.edgeproxy.net. Like most security tools, anonymous proxies are incredibly useful but also controversal. Web proxies mask your activities on...

View Article

Lockdown Windows 7 with Simple Scripts

Lockdown your windows 7 services with this simple script

View Article


10 Ways to Protect Yourself From Identity Theft

Identity theft is nothing new, but the rise of the Internet has turned ID theft into a multibillion dollar international business. There are plenty of companies out there that want to sell you...

View Article


10 Steps to Prepare Your Data Center for the Zombie Apocalypse

Is your data center ready for the coming zombie apocalypse? Data center designers generally do a good job preparing for conventional risks, like earthquakes, fires, floods and hurricanes, but if your...

View Article
Browsing all 10 articles
Browse latest View live