General security

Achieving Anonymity with Tor Part 1

We all know that Tor enables us to be anonymous on the Internet. In this article we'll look at how to achieve this and truly know what we're up against. Firs

A Review of the eSoft InstaGate UTM Appliance

It can take an organization several years to build out an information security infrastructure capable of providing them with sufficient protection. This is e

Defending the Internet with Project Meshnet

Introduction Topics related to Internet censorship have been debated frequently in the last few years. The main purpose of most Internet censorship action

Chapter 9: Securing remote access

Remote access is no longer just about a laptop or home desktop user connecting to catch up on some work or update customer and order information. The explosi

Chapter 8 - UEFI and the TPM: Building a foundation for platform trust

Traditional boot processes cannot stop sophisticated attacks instantiated before operating system load. Consequently, we need a method to ensure that when th

Protect Your Wireless Network from Leechers and Hackers

Nowadays pretty much everyone uses wireless networking from your smart phone to your home and/or business networks. There are many security issues with wirel

IObit Protected Folder Authentication Bypass

Acknowledgements I would like to dedicate this article to all my friends, they know who they are, and to Irene, for her love and support.[pkadzone zone="main

Chapter 7: The role of cryptography in information security

After its human resources, information is an organization's most important asset. As we have seen in previous chapters, security and risk management is data

Social Media Security

Excerpted from Securing the Clicks: Network Security in the Age of Social Media by Gary Bahadur, Jason Inasi, Alex de Carvalho (McGraw-Hill; 2012) with per

Defending yourself from Google hackers

Before looking how we can prevent ourselves from Google hackers, let's see what Google hacking is. Google Hacking: [pkadzone zone="main_top"] [pkadzone zone=