LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
What I Learned at Hacker Camp
03 April 2006
or a full day, I would immerse myself in the tricks of the computer hacking trade, getting hands-on
General Security
1 - 2 min read
Network Disruption and Denial of Service
03 April 2006
Organisations today invest millions of dollars and thousands of man-hours in building out their IP b
Network Security
1 - 2 min read
Passive Visual Fingerprinting of Network Attack Tools
03 April 2006
This paper examines the dramatic visual fingerprints
left by a wide variety of popular network atta
Network Security
1 - 2 min read
How To Break Web Software
02 April 2006
It's as certain as death and taxes: hackers will mercilessly attack your Web sites, applications, an
Documentation
1 - 2 min read
Defeating the Hacker
31 March 2006
Way back in the early 1980s, Robert Schifreen shot to notoriety as one of the hackers who broke into
Documentation
1 - 2 min read
The Top 10 Information Security Myths
30 March 2006
When it comes to information security, there's a lot of popular wisdom available, but much of it is
General Security
1 - 2 min read
Security isn't always perfect, but it doesn't necessarily have to be
30 March 2006
A big part of being a security professional, or for that matter an informed citizen, is examining a
General Security
1 - 2 min read
Ensure data doesn't leave with your staff
28 March 2006
With average employee turnover in the UK stable at about 15%, the security implications of staff dep
General Security
1 - 2 min read
Exegesis of Virtual Hosts Hacking
27 March 2006
There is a lot that we can say about finding virtual hosts from a given IP address. Sometimes this t
General Security
1 - 2 min read
Secure Coding
27 March 2006
The primary cause of commonly exploited software vulnerabilities is software defects that could have
General Security
1 - 2 min read
Domain Registrar Joker Hit by DDoS
26 March 2006
Domain registrar Joker.com says its nameservers are under attack, causing outages for customers. Mor
Network Security
1 - 2 min read
Enterprise Security Threats Increasingly Come from Within
24 March 2006
While protecting corporate networks from outside intrusion remains a huge challenge for enterprise I
General Security