skip to main | skip to sidebar

Counter-Interference Force

Security ... think about it!

I should be able to resume posting shortly.

Video: Three Natural Laws of Security is currently unavailable. Seeking new hosting site.

2011-02-23

"Data is encrypted in a file system where it's stored," said Skoudis, who joined with Johannes Ullrich, chief research officer at SANS Technology Institute, to speak at the RSA Conference last week on dangerous attack techniques that appear to be on the rise. Though stored encrypted, the data has to be processed by some application and "if you're processing that data it will be processed in that system unencrypted," Skoudis pointed out.[networkworld.com]
Posted by rlssec
Newer Post Older Post Home

Video

  • Three Natural Laws of Security

Free Computer Security Measures

  • List of (mostly) free tools (some dangerous if misused)
  • Zone Alarm Firewall
  • Hushmail
  • Eraser
  • CrapCleaner - MRU Eraser
  • Spybot S&D via Download.com
  • Avira Free Personal Anti-virus

Blog Archive

  • ►  2012 (130)
    • February (63)
    • January (67)
  • ▼  2011 (721)
    • December (46)
    • November (30)
    • October (50)
    • September (55)
    • August (7)
    • July (53)
    • June (69)
    • May (73)
    • April (70)
    • March (101)
    • February (58)
    • January (109)
  • ►  2010 (1371)
    • December (133)
    • November (127)
    • October (83)
    • September (87)
    • August (79)
    • July (33)
    • June (71)
    • May (149)
    • April (158)
    • March (169)
    • February (143)
    • January (139)
  • ►  2009 (1213)
    • December (120)
    • November (146)
    • October (149)
    • September (67)
    • August (82)
    • July (119)
    • June (118)
    • May (184)
    • April (228)