LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Managed Security Service Expands Compliance Capabilities
03 March 2005
“RES’ Information Security and Threat Management solution provides a perfect blend of best pract
Government
1 - 2 min read
Linux starts to take a more central IT role
02 March 2005
"It's as deep as it will get for us. It's what we're betting the data center on," said Jon Fraley, a
General Security
1 - 2 min read
Find wireless rogues without sensors
02 March 2005
I finally settled on a strategy for wireless security. As wireless access points began appearing on
Wireless Security
1 - 2 min read
Real Player under Attack
01 March 2005
For Linux the RealPlayer 10 and the Helix Player are affected. No fixed versions are available for t
Host Security
1 - 2 min read
Realistic SELinux
01 March 2005
SElinux is an impressively designed but notoriously hard-to-configure set of kernel hooks that enfor
SELinux
1 - 2 min read
Why you should perform regular security audits
01 March 2005
Want more advice for locking down your network? Stay on top of the latest security issues and indust
General Security
1 - 2 min read
Firewall warns dealers of physical security threat
01 March 2005
Specialist distributor, Firewall Systems, is warning resellers to start thinking of security as a ma
Firewalls
1 - 2 min read
Computer Security 101
01 March 2005
This sort of basic firewall has some issues that can be exploited by hackers and malicious programme
General Security
1 - 2 min read
Firewalls' False Sense of Security
28 February 2005
The Internet front door to almost every bank and financial services company in the world is guarded
Firewalls
1 - 2 min read
How secure is your computer?
27 February 2005
StillSecure attached six computers - loaded with different versions of the Windows, Linux and Apple'
Host Security
1 - 2 min read
Two Sides of Vulnerability Scanning
27 February 2005
There are two approaches to network vulnerability scanning, active and passive. The active approach
Network Security
1 - 2 min read
Feds square off with organized cyber crime
24 February 2005
Computer intruders are learning to play well with others, and that's bad news for the Internet, acco
Government