Musings - Geek speak elucidations

The Authentication Factor

07/15/2008 09:58
With the increasing sophistication of malware and other security threats, it has been obvious for quite some time that the standard “locks” we are using to secure our information may not be up to the task. The venerable “username and password” combination is generally used for everything...

Security insecurity: How concerned should you be?

05/28/2008 11:53
Information Security cannot be achieved with just a device or program, but must be embraced as a foundation for building your organization. These days, it’s not only giant multi-national conglomerates that are experiencing security issues with hackers, viruses or breaches. Increasingly, it’s small...

Seen the spammer, and he is us

04/10/2008 21:10
Ever wonder where that spam comes from? It could be coming from you… Many computers that become compromised with malicious software (also called malware: viruses, worms, spyware, etc.) are not being infected in a way that most people would think. Their hard drives remain intact, they aren’t...
<< 7 | 8 | 9 | 10 | 11 >>

Rants - Tech savvey explications

IE 0 Day Exploit

12/12/2008 19:27
Microsoft reported a new "zero-day exploit" that affects most versions of the Internet Explorer browser. A zero-day exploit is a security vulnerability that is being exploited before the software vendor or public know that the issue exists. This particular exploit attacks flaws within Internet...

Spoofed NDR issues

04/14/2008 13:05
We've seen a rash of NDR (non-Delivery Response) floods happening to our clients. In all cases, it appears that the spam being NDRed is spoofed, but we are receiving reports from these users that they are being black listed on spam filters. Is anyone else seeing this problem? Thanks, -J-

Welcome to the home of the Certifiable Technologist - Jason Appel

Welcome. This is an area dedicated to thoughts, comments, discussions, and musing on network/computer security, privacy, and technology... or anything else that looks interesting. The idea is to provide analysis, commentary and geekspeak translations of news, events, and happenings in the security and technology arenas.

You can read new posts on this blog via the RSS feed.

J.

 

Keep in mind that this site is a work in progress

I am always interested in constructive critisism and suggestions, so feel free to comment.

 

01001010