The Snare Of Unauthorized Requests

Monday, April 21st, 2008

Almost everyone knows what CSRF or better unauthorized requests are. I never really embraced CSRF as the correct term for unauthorized request issues, because the term is outdated and inadequate to contemporary hacking. For me, an unauthorized request is the layer or automation of a hacking procedure without direct interference ...

New Compression Tool Triples Network Storage

Sunday, April 20th, 2008

Storwize has developed a new range of in-line data compression appliances which it claimed can compress files at up to 500MB/s, doubling or even tripling the effective capacity of a NAS array. The three new systems are 64-bit, meaning they can use far more memory than the company's previous models. That ...

24 Digital Spy Tools To Capture, Protect, And Secure Data

Saturday, April 19th, 2008

Back in the '60s, when the spy craze first hit, would-be snoops had to satisfy their desire for spy gear with products like 007 cologne and aftershave, when what they really wanted was the bug Bond hid beneath the bumper of a quarry's car, or the greenscreen mapping device mounted ...

The New E-spionage Threat

Friday, April 18th, 2008

The e-mail message addressed to a Booz Allen Hamilton executive was mundane—a shopping list sent over by the Pentagon of weaponry India wanted to buy. But the missive turned out to be a brilliant fake. Lurking beneath the description of aircraft, engines, and radar equipment was an insidious piece of ...

How Anonymous Are You?

Thursday, April 17th, 2008

You may think that you are anonymous as you browse web sites, but pieces of information about you are always left behind. You can reduce the amount of information revealed about you by visiting legitimate sites, checking privacy policies, and minimizing the amount of personal information you provide. What information is ...