LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
What to Do When Your Security's Breached
27 March 2007
Well, it's finally happened. Despite all your efforts to stop both internal and external attackers,
General Security
1 - 2 min read
ALT+NUMPAD ASCII Key Combos: The
21 March 2007
For example, by holding down the ALT key, typing 234 on the number pad, then releasing ALT gives you
General Security
1 - 2 min read
SELinux by Example
15 March 2007
The 14 chapters are in turn broadly divided into three parts with the first part containing chapters
Documentation
1 - 2 min read
Nailing The Rogue Wireless Warriors
14 March 2007
If you've been reading my entries over the past 3+ years here at ITT, you're obviously aware that I'
Wireless Security
1 - 2 min read
GnuPG and GnuPG Clients Unsigned Data Injection Vulnerability
07 March 2007
Scripts and applications using GnuPG are prone to a vulnerability in how signature verification info
General Security
1 - 2 min read
JavaScript traps for analysts
06 March 2007
On Friday, Lorna posted a diary about some malware we received that day. A compromised site hosted a
General Security
1 - 2 min read
Hacking with smart phones
06 March 2007
You're at a conference outside the office when your smart phone receives a sensitive e-mail projecti
Wireless Security
1 - 2 min read
Biometrics Overview
04 March 2007
Identification and verification have long been accomplished by showing something you have, such as a
General Security
1 - 2 min read
Black Hat Demonstrations Shatter Hardware Hacking Myths
01 March 2007
At the Black Hat Briefings here on Jan. 28, two breakthrough hardware hacks were demonstrated. One s
General Security
1 - 2 min read
O'Reilly Releases Backup & Recovery
01 March 2007
Using a system without backups is like driving your car 100 miles per hour down a busy road the day
Security Sources
1 - 2 min read
How to Keep a Digital Chain of Custody
28 February 2007
Don't get her wrong
General Security
1 - 2 min read
Honeypots and User-Mode-Linux (UML)
27 February 2007
In technical terms, a honeypot performs a function very similar to that of a "honeypot" in the outsi
Intrusion Detection