LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Interview with muslix64, Developer of BackupHDDVD
25 January 2007
The next generation of optical disc technology holds the promise to change the way we interact with
General Security
1 - 2 min read
Port Knowledgebase
21 January 2007
List of frequently seen TCP and UDP ports and what they mean. The goal of this port table is to poin
Network Security
1 - 2 min read
Professional Security Accreditation Moves Closer
18 January 2007
IT security experts will be able to achieve professional qualifications on a par with occupations su
General Security
1 - 2 min read
Ajax Sniffer - Prrof of concept
18 January 2007
The original idea was discussed by Stefano Di Paola in his paper Subverting Ajax. I have simply crea
Network Security
1 - 2 min read
Open Source Digital Forensics Tools:
18 January 2007
This paper addresses digital forensic analysis tools and their
use in a legal setting. To enter sci
General Security
1 - 2 min read
Pretexting banned in the US
17 January 2007
The kind of surveillance activities carried out on behalf of computing giant Hewlett-Packard which c
General Security
1 - 2 min read
Breaking into a VPN
15 January 2007
The IP extension IPSec is generally considered the most secure VPN technology. But it also has its w
General Security
1 - 2 min read
Secure software education. Does it start with our tools?
11 January 2007
For years we have been trying to educate developers to run with least privilege so they can build sa
General Security
1 - 2 min read
'Make your own man-in-the-middle attack' online kit found
11 January 2007
Fraudsters are hawking free trials of "universal" man-in-the-middle phishing kits through an online
General Security
1 - 2 min read
The Fight Against Phishing: 44 Ways to Protect Yourself
10 January 2007
It's a scam that generates billions of dollars even when only 5 percent of the darts hit the target,
General Security
1 - 2 min read
Wireless Forensics: Tapping the Air - Part Two
09 January 2007
In part one of this series, we discussed the technical challenges for wireless traffic acquisition a
Wireless Security
1 - 2 min read
Rift Widens Over Bug Disclosure
04 January 2007
This dueling banjos of bug reports and fixes is an example of how researchers aren't all on the same
General Security