LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Building Secure Applications: Consistent Logging
27 February 2007
This article examines the dismal state of application-layer logging as observed from the authors yea
General Security
1 - 2 min read
Using Honeypots to learn about HTTP-based attacks
26 February 2007
With the constant growth of the Internet, more and more web applications are being deployed. Web app
General Security
1 - 2 min read
Government backs digital lockdown
22 February 2007
The government has rejected a call to ban the digital locks that limit what people can do with the s
General Security
1 - 2 min read
Sloppy configurations make for unsecured VPNs
22 February 2007
The IP extension IPSec is generally considered the most secure VPN technology. But it also has its w
Network Security
1 - 2 min read
Avoid Wasting Money on Penetration Testing
21 February 2007
Penetration Testing is the final word in proving that technical compliance and good security practic
General Security
1 - 2 min read
Danger inside the firewall
20 February 2007
Between the latest firewall technology and advanced intrusion detection systems, IT professionals ar
Firewalls
1 - 2 min read
Home routers are open to remote attack
20 February 2007
They have demonstrated that users could open up their router's traffic as a result of visiting a web
Network Security
1 - 2 min read
Javascript decoding round-up
20 February 2007
In the recent past, we've shown several methods on how to unravel obstinate JavaScript codes used to
General Security
1 - 2 min read
Cisco warns of more router vulnerabilities
14 February 2007
The intrusion prevention capabilities of Cisco Systems' routers could be prone to attack, after the
Network Security
1 - 2 min read
Top Five Web Application Vulnerabilities
14 February 2007
PHP version 5.2.0 and prior is susceptible to multiple security vulnerabilities. If exploited, these
Host Security
1 - 2 min read
Skimp On The Sheep, Skimp On Security
14 February 2007
I work at a mid-sized hosting company, and we're locked up like Ft. Knox. You've been in a ton of th
General Security
1 - 2 min read
Don't Abuse Your Risk Assessment
12 February 2007
After some conversations with some folks this weekend about their security programs within their com
General Security