LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Analyzing Large DDoS Attacks Using Multiple Data Sources
06 September 2006
Internet distributed denial of service (DDoS) attacks are
becoming increasingly prevalent [1]. To p
Network Security
1 - 2 min read
The Changing Face of Disaster Recovery
05 September 2006
Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT
General Security
1 - 2 min read
Wi-Fi guidance becomes law in California
05 September 2006
California legislators have passed a law which will force makers of wireless internet equipment to i
Wireless Security
1 - 2 min read
(IN)SECURE Magazine issue 8 has been released
04 September 2006
Hello everyone, welcome to issue 8 of (IN)SECURE. We
Documentation
1 - 2 min read
Security Engineering (The Book)
01 September 2006
My goal in making the book freely available is twofold. First, I want to reach the widest possible a
Documentation
1 - 2 min read
Don't stay in denial on information risk
31 August 2006
Most enterprises are now "IT-centric", depending increasingly on IT for their critical business inf
General Security
1 - 2 min read
A wireless hacking computer that can't be hacked
30 August 2006
If you think seeing a dozen wireless networks makes your computer the ultimate scanning box, think a
Wireless Security
1 - 2 min read
Both Sides Shift Cyberwar Tactics
29 August 2006
Cyberwar is changing, and network defense must adapt, two leading executives told a military audienc
Government
1 - 2 min read
Most Damaging Attacks Rely On Stolen Log-ins
29 August 2006
More than 8 out of every 10 computer attacks against businesses could be stopped if enterprises che
General Security
1 - 2 min read
Preventing HTML form tampering
24 August 2006
All web applications rely on HTML forms to receive input from the user.
However, HTML forms have
General Security
1 - 2 min read
The -they shall not be broken into- challenge
21 August 2006
What if your boss walks up to you and asks you to build a web site that shall not be broken into, no
General Security
1 - 2 min read
OpenSSH Introduction
18 August 2006
SSH is the secure replacement for rlogin, rsh and telnet, which has been used in the past to do remo
Network Security