LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Can UK law stop criminal hackers?
17 April 2006
MPs are preparing to get tough on hackers as the law on computer misuse and hacking is up for a reva
Government
1 - 2 min read
"IM me" a strike order
17 April 2006
Flexible military communications have always been of great importance, and flexibility here stands f
Network Security
1 - 2 min read
Social Engineering a Police Officer
14 April 2006
Really nice social engineering example. Note his repeated efforts to ensure that if he's stopped aga
General Security
1 - 2 min read
Disturbing developments in DDoS attacks
14 April 2006
Traditional DDoS of course is when an attacker uses thousands of centrally controlled zombie machine
Network Security
1 - 2 min read
On the Insecurities of the Internet
14 April 2006
Among the most popular stereotypes related to Cyberterrorism, is that of terrorists shutting down th
General Security
1 - 2 min read
SearchSecurity.com's Intrusion Defense School
14 April 2006
Your organization's ability to fend off spyware, viruses and increasingly savvier attacks hinges on
Security Sources
1 - 2 min read
The Enemy Inside
13 April 2006
For many years external security threats received more attention than internal security threats, but
Network Security
1 - 2 min read
Design Flaw in Human Brain Prevents Detection of Phishing Websites
13 April 2006
"Why Phishing Works" is a recent study (PDF) that examines phishing website techniques. The most vis
General Security
1 - 2 min read
The weakest link in the security chain? You
13 April 2006
Human error was responsible for nearly 60 per cent of information security breaches last year, a new
Forums
1 - 2 min read
Fear sells. Read the report
13 April 2006
Every two years the show serves as forum for the announcement of the DTI's Information Security Brea
General Security
1 - 2 min read
Magnetic Data Recovery
12 April 2006
The majority of today’s businesses rely in some way upon computer systems to handle the tasks of e
General Security
1 - 2 min read
Case Of The Lucrative Lure
12 April 2006
"Hand me the boot disk." I said as I motioned to Scrap with my right paw. My left paw was busy makin
Intrusion Detection