LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Hands-on testing of the new Linux virus
19 April 2006
Thanks to one of our readers, NewsForge has obtained a copy of the widely reported Windows/Linux cr
Host Security
1 - 2 min read
Community Creators, Secure Your Code!
19 April 2006
Personalization is a great feature—it allows users to make their personal pages come to life by ad
General Security
1 - 2 min read
Web App Vulnerabilities Are Getting More Attention; Now's The Time For IT To Get Defensive
18 April 2006
Attacks designed to bring down networks are largely under control, even though companies still spend
General Security
1 - 2 min read
Steps For Better, Simpler Wireless Network Security
18 April 2006
The J. Craig Venter Institute has security measures in place for its wireless LAN, including a VPN,
Wireless Security
1 - 2 min read
Cross-platform virus poses little risk
18 April 2006
Security watchers have uncovered proof-of-concept (POC) malware that's capable (at least theoretical
General Security
1 - 2 min read
Top 15 Security/Hacking Tools & Utilities
18 April 2006
Nmap ("Network Mapper") is a free open source utility for network exploration or security auditing.
Network Security
1 - 2 min read
What's the next security threat?
18 April 2006
In January this year, 20-year-old Jeanson James Ancheta pleaded guilty in a California court to char
Government
1 - 2 min read
The Future of Phish Fighting
18 April 2006
Since e-mail standards won't be of much help, we'll have to deal with phishing through private, comp
General Security
1 - 2 min read
Book Review: Software Security - Building Security In
17 April 2006
I'm jealous. No seriously. If Cigital is actually ran as depicted in the book Software Security - Bu
Documentation
1 - 2 min read
Your tax info may not be as secure as you think
17 April 2006
A rule change proposed by the U.S. Treasury Department and the Internal Revenue Service (IRS) has co
Government
1 - 2 min read
The Fear Industry
17 April 2006
What you don't know about the security of your information systems can hurt you and probably alread
General Security
1 - 2 min read
Finding software vulnerabilities with "honeyclients"
17 April 2006
I've been a big fan of honeypots ever since I first learned about them in Clifford Stoll's The Cucko
Intrusion Detection