How to Use Honeypots to Improve Your Network Security

Monday, August 25th, 2008

Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used in order to protect communication networks include firewalls, encryption and IDS (Intrusion Detection Systems). The strategy follows the classical security paradigm of "Protect, Detect and React.” In other words, try to protect the ...

15 Great, Free Privacy Downloads

Thursday, August 7th, 2008

One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your keystrokes as you type. Eavesdroppers ...

DRAM Prices Expected to Drop Again

Monday, August 4th, 2008

Good news: the perpetual price drops in the DRAM industry are back again, according to an alert issued Monday by analyst firm iSuppli.The report was targeted at OEMs, iSuppli's clients, but the news actually benefits consumers: after a mild recovery in the second quartr, prices are expected to drop in ...

How Much Is Antivirus Slowing Down Your PC?

Monday, August 4th, 2008

Most of the major security suite vendors release their new editions in the fall, but some run ahead or behind the rest of the pack. With the release of Kaspersky Internet Security 2009 the fall flood of security suites has officially begun. I'm working on two other suites right now, ...

Wi-Fi networks suffer ‘autoimmune’ attacks

Monday, August 4th, 2008

JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...