Monthly Archives: May 2004

Defense In Depth

Perhaps the best way to visualize Defense in Depth as it relates to Information Security is to view the recent blockbuster movie: “The Two Towers”. When the antagonists approached the perimeter defenses at Helm’s Deep, they were first greeted by a volley of arrows.

Beyond antivirus software

Whenever a new virus threat appears, there is a period in which users are exposed to infection. This is because the virus has time to spread during the gap between the moment when the virus appears and the moment when the laboratories of antivirus companies provide their customers with an update to neutralize the new… Read More »

Identity Theft – The Real Cause

To understand the crime of identity theft and to see why it is such a rapidly growing problem you need to go back a few years. At that time here were criminal gangs that needed to launder the proceeds of their crimes.

Mobile and Wireless – Built-In Security

Mobile and wireless technology with its freedom of flexibility, the increase of workplace productivity, which answer the need for communication and accessing information from anywhere and anytime, appeals to enterprise and home customers alike to take the next step and integrate wireless technology into their infrastructure.

A new battle against viruses

Four years ago, the Internet community was caught off guard by a worm that sent itself in a message purporting to be a love letter. The now infamous LoveLetter virus was headline news for days. During this time users scrambled to protect their PCs.

Linux Pocket Guide

This book is an upfront, no bull, book. It´s all about the essentials, it doesn´t bore you with commands you will never use, or about history you could care less about, it´s a short reference guide for the essential commands used in Linux. The book provides loads of examples and tips on how to use… Read More »

Surveying the Open Source Landscape

It is easy to see the impact that open source software has had on the developer community. A Google search for “open source” turns up over nineteen million results. That’s more than a similar search for “Oracle”, and nearly one-fifth as many as for “Microsoft”, the king of proprietary software.