LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
eDiscovery Challenges
03 March 2006
During the past two decades, the shift from paper to electronic filing of business documents introdu
General Security
1 - 2 min read
IT departments taking over physical security
02 March 2006
As firms move towards converged voice-data IP networks, IT departments will increasingly become resp
General Security
1 - 2 min read
How to setup penetration testing exercises.
02 March 2006
Based on the many responses we got regarding the 'Packetslinger' diary, here a few notes on how to s
Security Sources
1 - 2 min read
Ernst & Young loses four more laptops
01 March 2006
Ernst and Young appears set on establishing a laptop loss record in February. The accounting giant h
General Security
1 - 2 min read
Rootkit Hunting vs. Compromise Detection
28 February 2006
The presentation I gave in Washington, D.C., at Black Hat Federal Conference in January 2006. It's a
Organizations/Events
1 - 2 min read
Ernst & Young fails to disclose high-profile data loss
28 February 2006
Ernst and Young should go ahead and pony up for its own suite of transparency services. The accounti
General Security
1 - 2 min read
How to bypass your BIOS Password
28 February 2006
Basic BIOS password crack - works 9.9 times out of ten. This is a password hack but it clears the
General Security
1 - 2 min read
Google Hacking: Ten Simple Security Searches That Work
27 February 2006
Google has become the de facto standard in the search arena. It's easy, quick and powerful. For thos
General Security
1 - 2 min read
How secure is open source?
27 February 2006
Received wisdom would have it that transparency makes systems more secure by allowing anyone to view
General Security
1 - 2 min read
Review: Penetration Tester’s Open Source Toolkit
24 February 2006
The Penetration Tester’s Open Source Toolkit is a new offering from Syngress that primarily focuse
Security Sources
1 - 2 min read
Interviewing Hackers
24 February 2006
Many articles address the question of how to interview people when trying to fill a technical post.
General Security
1 - 2 min read
Writing Behind a Buffer
23 February 2006
In this paper we are going to describe a kind of vulnerability that
is known in the literature but
LinuxSecurity.com Feature Articles