Ten ways improve Vista’s security

Wednesday, August 20th, 2008

Although Windows XP was Microsoft's preferred desktop operating system for an unprecedented length of time, it became something of a PR nightmare for the software giant. Windows XP is full of security holes and is very easy to compromise. When Microsoft created Windows Vista, its primary goal was to address ...

15 Great, Free Privacy Downloads

Thursday, August 7th, 2008

One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your keystrokes as you type. Eavesdroppers ...

FWAuto v1.1 – Firewall Auditing & Ruleset Analyzer Tool

Monday, July 14th, 2008

FWAuto (Firewall Rulebase Automation) is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files. Maybe ...

Radmin Default Installation Security Vulnerabilities

Monday, June 30th, 2008

"By default, Radmin uses a known port, TCP port 4899 for remote access. In addition, if you are using password authentication only, a remote user only has to find an open TCP port 4899 and guess one word: your password.Suggestions:It is very easy to implement any or all of the ...

Endpoint security holes an open door for attackers

Monday, June 23rd, 2008

Everyone knows that there's no such thing as 100% security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are. Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security ...