LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Linux software can secure an entire network
02 February 2005
An IBM report that tested the suitability of Linux software to secure an network its entirety has co
Network Security
1 - 2 min read
Identity Management: Controlling the Costs of Continuous Compliance
02 February 2005
There are a number of technologies that can streamline your compliance effort so that your company r
General Security
2 - 4 min read
Getting to Know Linux Security: File Permissions
02 February 2005
Welcome to the first tutorial in the 'Getting to Know Linux Security' series. The topic explored
LinuxSecurity.com Feature Articles
1 - 2 min read
Best Security Software Solution
Live Voting
01 February 2005
SYS-CON's Readers' Choice Awards program is considered to be the most prestigious award program of t
General Security
1 - 2 min read
Reporting Kernel Security Issues
01 February 2005
A lengthy and interesting thread was started on the lkml by Chris Wright looking to define a central
Host Security
1 - 2 min read
Linux security is a 'myth', claims Microsoft
31 January 2005
A senior Microsoft executive, speaking exclusively to vnunet.com, has dismissed Linux's reputation a
General Security
1 - 2 min read
Home User Security Guide
31 January 2005
I know many of you have received some nice to tech toys for Christmas recently, so its time to talk
Host Security
1 - 2 min read
Monthly Advertising Specials
30 January 2005
LinuxSecurity.com offers monthly, limited-time advertising specials to assist potential marketers in
Uncategorised
1 - 2 min read
Microsoft Claims Linux Security a Myth
30 January 2005
Microsoft bigwig Nick McGrath claims that Linux security is highly exaggerated, and that the open so
Host Security
1 - 2 min read
Run information security like you run your busines
27 January 2005
Do your CSO, CIO, information security professionals and software developers have measurable quotas
General Security
1 - 2 min read
Patching up problems
27 January 2005
The race to plug network holes before attackers use them is running system managers ragged--so they'
Firewalls
4 - 6 min read
The Tao of Network Security Monitoring: Beyond Intrusion Detection
27 January 2005
The Tao of Network Security Monitoring is one of the most comprehensive and up-to-date sources av
LinuxSecurity.com Feature Articles