LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
European project takes new approach to information security
28 November 2005
Despite millions of dollars spent by IT companies, digital security often contains more holes than a
General Security
1 - 2 min read
SSL VPNs: Remote Access for the Masses
28 November 2005
Secure Sockets Layer (SSL) for remote access is based on a simple concept: use the encryption and au
Network Security
1 - 2 min read
Making your security fit
24 November 2005
There is no doubt that network security keeps IT directors awake at night. And it doesn't look like
Network Security
1 - 2 min read
Security: Freedom to enter but no right to roam
24 November 2005
When you add the responsibility for information and security in an organisation that ranges across E
Network Security
1 - 2 min read
O3 Magazine
23 November 2005
O3 magazine is a free magazine distributed electronically in PDF format. O3 is published on a monthl
Documentation
1 - 2 min read
Overcoming those first hurdles when selling a security solution
23 November 2005
The reality is that in the last 14 years the number of global cases that identify corporate board me
General Security
1 - 2 min read
DCHP, shared feeds and lots of service management
22 November 2005
DHCP is now a key potential point of failure for many organisations, said Nominum as it introduced v
Network Security
1 - 2 min read
Study: Security still top IT spending priority
22 November 2005
A recent survey of 100 US IT executives predicts that IT spending will decrease slightly in 2006 as
General Security
1 - 2 min read
"Wi-Fi Phishing" or "Evil Twin" Attack at Hotspots: How to Secure Your Mobile Workforce
21 November 2005
Using public hotspots is convenient, however you may want to think twice before accessing confidenti
Wireless Security
1 - 2 min read
Network monitors head for the high ground
18 November 2005
The lure of open source is strong, and it's starting to be felt by the traditional network monitorin
Network Security
1 - 2 min read
Most IT acceptable use policies contain 'gaping security holes'
17 November 2005
Small- and medium-sized enterprises (SMEs) are leaving themselves vulnerable to security and complia
General Security
1 - 2 min read
IDS: Still head of the class in security education
16 November 2005
Despite claims that intrusion detection tools are "old school" and often tedious to use, one technol
Intrusion Detection