LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Rats in the security world
03 July 2005
Not too long ago my wife and I decided to try out a Chinese restaurant in our area we had never visi
General Security
1 - 2 min read
Open source 'not big' in SMEs
29 June 2005
Open source software has not made a big impact in small to medium enterprises (SMEs), according to a
General Security
1 - 2 min read
Linux to the rescue: A review of three system rescue CDs
29 June 2005
We've all had this nightmare. You turn on your functioning Windows/Linux PC, and all you get is a bl
Security Sources
1 - 2 min read
Virtual Private Servers Virtualize the OS
28 June 2005
In today's never-ending crusade to reduce IT costs, various techniques are used to squeeze every dro
General Security
1 - 2 min read
Open-source projects get free checkup by automated tools
28 June 2005
More open-source software projects are gaining the benefits of the latest code-checking software, as
General Security
1 - 2 min read
What is the Best Firewall for Servers?
28 June 2005
I maintain a bunch of servers at our labs in the university. Of late, the number of attacks on the c
Firewalls
1 - 2 min read
Xen Developers Focus on Security
27 June 2005
With the next major release of the Xen Virtual Machine Monitor expected this August, the project's d
Host Security
1 - 2 min read
eSecurity management comes of age
24 June 2005
In this environment, no organisation can afford to be without intelligent and proactive security mon
General Security
1 - 2 min read
Government looks into Open Source Security
23 June 2005
The Cabinet Office's Central Sponsor for Information Assurance, which co-ordinates information secur
Government
1 - 2 min read
IT and physical security joining hands
20 June 2005
IT departments and physical security departments at corporations must learn to work together and coo
General Security
1 - 2 min read
O'Reilly Releases "SSH, The Secure Shell: The Definitive Guide, Second Edition"
15 June 2005
The name looks like the sound you'd make to hush someone, which is not inappropriate if you think of
Documentation
1 - 2 min read
BindView Presents IT Security Compliance Best Practices for the C&A Process
15 June 2005
The C&A process is well-known by federal agencies as a highly manual process that artificially incre
General Security