Basic Computer and Network Security
Facebook Security - 5 Things You Should Never Post on Facebook
5 Things You Should Never Post on Facebook
DIY iPhone-controlled Home Security Camera for Less Than 100 dollars
How to setup a iPhone-controlled home security camera system for under $100
Who's Following Your Child on Twitter?
Do you know who's following your child on Twitter? Here are some Twitter privacy and safety tips to help keep you and your family safe.
Facebook Security, Safety, and Privacy
All you ever wanted to know about Facebook Security, Safety, and Privacy but were afraid to ask.
How to Make a Strong Password
Tips to make your password really hard for bad guys to crack
Stealth Yourself - How to Stealth Yourself Online
Tips to make yourself digitally invisible online to remain anonymous, avoid targeted advertising, online stalking, and other invasions of privacy.
How to Safely Recycle or Sell Your Old Computer
It's time to get rid of your old computer and get a new one. Let's review a couple of things you need to do before you chuck that old paperweight of a PC.
Security Tips and Tools to help your fight back against cybercriminals
Beware Hurricane Katrina Scams
In the wake of a tragedy such as the devastation of Hurricane Katrina, many people search for ways to contribute and help. Unfortunately, many people search for ways to capitalize on the tragedy for malicious intent and they often target those who are searching for ways to help. You need to be cautious and stay on your guard to avoid falling prey to a Hurricane Katrina scam.
How to Hide Your Facebook Posts From Your Mom
Let's face it, when your mom joins Facebook and becomes your "friend", the party is over. No more swearing in your posts, no more posting pictures of your drunken escapades, no more sharing videos involving feces slinging monkeys. No more fun. But wait, It doesn't have to be this way! Let's take a look at how to block your mom from seeing...
Blaming Technology For Human Error
Blaming Technology For Human Error is an article about placing the blame for security breaches where it generally belongs, on the people who administer and use it, and about not relying on technology as a holy grail to fix the flaws in the weakest link of the security chain, humans.
Comodo Provides RegistryPro with Security Features To Support Launch of .Pro Internet Registry
Information and press release from Comodo regarding new .PRO domain extensions for professionals such as doctors, lawyers and CPA's.
Desktop Search Tools Don't Pose Real Security Risk
Google recently released a desktop search utility similar to the X1 desktop search tool I reviewed a few months ago. Microsoft and Yahoo are promising similar tools coming soon. These tools are very handy and make searching for information much more efficient, but they also pose some security concerns that users should be aware of.
Disclosing Exploit Code
When security researchers find a vulnerability, and the vendor has been notified and created a fix- the vulnerability is made public and often the exploit code as well. Security researchers are now wrestling with the ethical implications of this practice.
Encrypted News Groups
EncryptedNewsGroups.com has a tremendous amount of information and articles to help you learn more about using your computer and surfing the Internet while maintaining your privacy and security.
Foundstone Acquired By McAfee
Security and antivirus vendor McAfee announced plans to purchase vulnerability management and training firm Foundstone for $86 million. This brief article shares some insight on the purchase from Foundstone co-founder, President and Chief Technology Office (CTO) Stuart McClure.
Free Computer Security 101 Course
A free course to teach you the basics of computer networking and how to use the computer and the Internet safely and securely.
Hacking Exposed Chat Session
The chat session with Hacking Exposed authors George Kurtz and Stuart McClure (Joel Scambray could not attend) was a success. To read more about the session and the complete transcripts of the chat click here
Industry Teams Up To Prevent Buffer Overflows
AMD and Intel are incorporating "Execution Protection" technology into their next-generation processors which, in conjunction with changes that will be implemented in Windows XP Service Pack 2, will move to block buffer overflows and eliminate them as a security risk.
Interview With Ed Skoudis 2006
A new, 2006 interview with Ed Skoudis, author of Counter Hack Reloaded and Malware: Fighting Malicious Code.
Interview with Ed Skoudis
A question and answer session with respected information security author and SANS Institute lecturer Ed Skoudis.
Interview with Eric Cole
After recently reading and reviewing the book Hiding In Plain Sight, I managed to catch some time with the author Eric Cole for an interview.
Interview With Gary McGraw, Co-Author Of Exploiting Software
An interview with Gary McGraw, Chief Technology Officer of Cigital and co-author of Exploiting Software.
Mea Culpa or Tu Culpa?
Recent worms such as SQL Slammer and MSBlast have taken advantage of known vulnerabilities for which patches were available. Who should ultimately take responsibility for securing the Internet against such threats?
From a security perspective, Microsoft products frequently have flaws and vulnerabilities which are targeted by virus and worm writers to create havoc throughout the Internet. But, is Microsoft itself bad for security?
Microsoft's New Antivirus Partnership
Microsoft announced the formation of VIA (Virus Information Alliance) in partnership with Network Associates AVERT and Trend Micro TrendLabs to collaborate on research and cooperate on communicating new virus threats.
National Strategy to Protect Lobbyists
The Bush administration asked then Cybersecurity Czar Richard Clarke to put together a plan to secure cyberspace. Unfortunately, politics got in the way and lobbyists won out over common sense. The resulting document was largely useless and remains unimplemented and ineffective in securing the Internet. Should the government try again?
Personal Firewall Day
Microsoft, TruSecure, Zone Labs and a handful of other software and security companies have declared January 15 to be Personal Firewall Day in an effort to increase awareness and improve security among the home users of the Internet
Researchers "Stumble" Onto Mystery Trojan
After weeks of suspicious TCP traffic all with a window size of 55808 but no means of tracing the packets back to the source security researchers have captured and analyzed a new Trojan which may be a harbinger of more ominous things to come.
Ten Tips to Prevent Identity Theft
It seems like almost weekly a major security breach is announced involving the compromise of hundreds of thousands or even millions of customer's personal information. The reality is that most identity theft is actually very low-tech and it is up to you to guard your own identity. These ten tips will help you protect yourself from identity theft.
The Secret Passage: Securing Remote Network Access
Remote network access opens a backdoor or secret passage to the corporate network that is difficult, if not impossible to secure and protect.
Using MySpace.com Safely
Viral networking sites that allow people to share personal information and link to other people with similar interests or backgrounds, such as MySpace.com, may be a privacy and safety concern, especially for parents of young teens.
Your Right Of Privacy
There is an assumed or implied Right Of Privacy in the United States. Many think it is rooted in the Constitution, but not without a good deal of interpretation. There are many statutes and regulations that guard personal information, but security and privacy generally come at the expense of freedom and convenience. It is up to you to make an educated choice about where you want the balance to be.
Zero Day Exploits: The Holy Grail
An article about zero day exploit vulnerabilities and how to protect yourself and your computer by your Guide, Tony Bradley
SCAP - What is SCAP?
Definition of Security Content Automation Protocol
Protect Your Social Network Accounts and Mobile Devices
This site is dedicated to security of mobile devices such as smart phones, iPhone, Droid, Blackberry, tablet computers, etc.
Protect Mac OS X
This portion of the site is devoted to all aspects of security of OS X
This site will guide users through the security topics related to Microsoft Windows operating system.
Secure Windows and Mac
Tips and other information on how to protect you Windows PC or Mac
How to Build an iPhone Accessible Pet Cam
We all hate leaving our pets at home while we're at work. What if you could check in on them whenever your wanted from you iPhone or Android? I'll show you how to make a low-cost Pet Cam for less than $100