You may be wondering about IDS and IPS, and which system has a proven track record, excellent performance and accuracy, and what will be around for the long term. If you haven’t heard of Snort, you may be surprised at how much one of the best offers for free.
The 2nd article in this series on the principle of least privilege examines privilege escalation and the related risks of users obtaining more or different privileges than the developer of an application intended possible. Vulnerabilities become exploits. Let’s look at how this happens.
Port scanners are key tools for network and systems security professionals. Fortunately, the best of these are free and/or Open Source. This article examines and compares the top five free port scanners available. If you don’t already have at least one in your kit, get one of these ASAP.
Penetration Testing uses a variety of specialized tools to make testing far faster and more effective at discovering vulnerabilities. Five of the top tools are highlighted in this article. We examine why these penetration testing tools are great at discovering vulnerabilities and when to use them.
Penetration Testing can seem like a black art to a beginner. To an IT veteran not specializing in security it may seem as simple as buying a product and clicking a few buttons. Neither of these ideas is true. Here we’ll examine how to get started with pen testing and how to do it well.
Windows security has been given high priority in Vista development. The ten top security reasons to use Windows Vista will show why Vista is the most secure desktop operating system ever built by Microsoft - much more difficult to exploit. The best Vista security reasons include valuable tips, too.
Email is always susceptible to attacks from viruses & email worms. To get a clear view of email security threats, testing email security is the way to go. Testing Email Security ensures that you are with the right email provider & your email is always secure from spam & other threats. Read more…
Is your computer secure? Is your network secure? Here’s a list of ten free security tests that you can use to test whether your computers and network are secure.
PGP Desktop 9.9 is a software suite for secure email, safe storage on disks, protected shared storage, as well as armored or self-decrypting archives. PGP Desktop provides individuals and companies comprehensive security for mobile computers and desktops by cryptography at an affordable price.
This article explains how to secure emails with PGP Desktop Email by introducing two fictive users Alice and Bob who install and setup PGP Desktop Email to prevent their emails from being spied on.