LinuxSecurity Contributor - Benjamin D. Thomas
Benjamin D. Thomas
Articles From Benjamin D. Thomas
1 - 2 min read
Wireless Forensics: Part One - Tapping the Air
03 January 2007
The huge adoption of wireless technologies over recent years has placed wireless data (or Wi-Fi) net
Wireless Security
1 - 2 min read
CSI: TCP/IP
03 January 2007
Located on the less fashionable north end of the Las Vegas strip, the Riviera Hotel and Casino has s
Network Security
1 - 2 min read
CERIAS Security Seminar Archive
02 January 2007
The Center for Education and Research in Information Assurance and Security (CERIAS) is currently vi
General Security
1 - 2 min read
U.S. Gov't To Use Full Disk Encryption On All Computers
01 January 2007
On June 23, 2006 a Presidential Mandate was put in place requiring all agency laptops to fully encry
Government
1 - 2 min read
Vulnerability Scanners Review
01 January 2007
A few months back I did some intense testing of all the best vulnerability scanners out there
General Security
1 - 2 min read
The Snort Top 10
29 December 2006
I am frequently asked questions, many of the questions are the same things over and over again, and
Intrusion Detection
1 - 2 min read
A new wave of attacks is challenging conventional wisdom about security
28 December 2006
Asymmetric warfare is hell. Sure, you may have night-vision goggles, body armor, and air support, bu
General Security
1 - 2 min read
Police blotter: Google searches nab wireless hacker
27 December 2006
Matthew Schuster began work as a computer technician for Alpha Computer Services in Wausau, Wisc., i
Wireless Security
1 - 2 min read
A design for a self-tuning portable RF jammer
27 December 2006
This website details the design and construction Wave Bubble: a self-tuning, wide-bandwidth portable
Wireless Security
1 - 2 min read
DOD bars use of HTML e-mail
26 December 2006
Due to an increased network threat condition, the Defense Department is blocking all HTML-based e-ma
Government
1 - 2 min read
Web 'safe' mark may elude new merchants
26 December 2006
As an online shopper, Claudia Race knows she must look out for scams. So as an Internet entrepreneur
General Security
1 - 2 min read
Breaking the same-origin policy by undermining dns-pinning
24 December 2006
The basis of the attack is rather old. It was described by the Princeton University in 1996 [1] and
Host Security