LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
OpenAjax to focus on security, complexity
18 October 2006
Sometimes it's all in the packaging. Take McDonald's "Happy Meals," for example. You've got a burger
General Security
1 - 2 min read
Hacking Tor, the Anonymity Onion Routing Network
17 October 2006
On October 4th one of our readers sent in a very worrying analysis of what appeared to be "traffic m
Network Security
1 - 2 min read
Free Security Courses
16 October 2006
The purpose of the courses on this site are to educate anyone responsible for
protecting informatio
Security Sources
1 - 2 min read
Hacking Web 2.0 Applications with Firefox
12 October 2006
AJAX and interactive web services form the backbone of
General Security
1 - 2 min read
Steganography for Dummies
11 October 2006
No security technique is new, and this one dates back to ancient Greece. Steganographic techniques G
General Security
1 - 2 min read
Analysis: Network Access Control
11 October 2006
All conspiracy theorists worth their salt have one thing in common: A certainty that far-reaching an
Network Security
1 - 2 min read
Is your DNS server configured wrong?
10 October 2006
More than half of the Internet's name servers are configured incorrectly, leaving networks vulnerabl
Network Security
1 - 2 min read
Insecurity in Open Source
09 October 2006
Debates over what methods result in the best software often pit those who favor an open-source appro
General Security
1 - 2 min read
Hack Louisville: Freeing Information Since 2005
09 October 2006
We're a group of hackers, nerds, social outcasts, pirates, outlaws, and geeks (not limited to those
Organizations/Events
1 - 2 min read
Cutting disaster down to size
06 October 2006
Most smaller companies are aware of the need to plan for contingencies. Fewer have converted concern
General Security
1 - 2 min read
On The Scene: Late To The Party
05 October 2006
Scrap told me a story once from his college days in an attempt to explain to me why he is frequently
Intrusion Detection
1 - 2 min read
10 tips to secure client VPNs
03 October 2006
If you have given your trusted employees and key contractors remote access to your network via a cli
Network Security