Archive for May, 2004

Defense In Depth

May 28th, 2004
Comments Off on Defense In Depth

Perhaps the best way to visualize Defense in Depth as it relates to Information Security is to view the recent blockbuster movie: “The Two Towers”. When the antagonists approached the perimeter defenses at Helm’s Deep, they were first greeted by a volley of arrows.
Read more…


Beyond antivirus software

May 26th, 2004
Comments Off on Beyond antivirus software

Whenever a new virus threat appears, there is a period in which users are exposed to infection. This is because the virus has time to spread during the gap between the moment when the virus appears and the moment when the laboratories of antivirus companies provide their customers with an update to neutralize the new code.
Read more…


Identity Theft – The Real Cause

May 24th, 2004
Comments Off on Identity Theft – The Real Cause

To understand the crime of identity theft and to see why it is such a rapidly growing problem you need to go back a few years. At that time here were criminal gangs that needed to launder the proceeds of their crimes.
Read more…


Mobile and Wireless – Built-In Security

May 17th, 2004
Comments Off on Mobile and Wireless – Built-In Security

Mobile and wireless technology with its freedom of flexibility, the increase of workplace productivity, which answer the need for communication and accessing information from anywhere and anytime, appeals to enterprise and home customers alike to take the next step and integrate wireless technology into their infrastructure.
Read more…


A new battle against viruses

May 11th, 2004
Comments Off on A new battle against viruses

Four years ago, the Internet community was caught off guard by a worm that sent itself in a message purporting to be a love letter. The now infamous LoveLetter virus was headline news for days. During this time users scrambled to protect their PCs.
Read more…


Linux Pocket Guide

May 7th, 2004
Comments Off on Linux Pocket Guide

This book is an upfront, no bull, book. It´s all about the essentials, it doesn´t bore you with commands you will never use, or about history you could care less about, it´s a short reference guide for the essential commands used in Linux. The book provides loads of examples and tips on how to use the commands, or different uses for them. This is a must have book for anyone who uses Linux.
Read more…

Articles, Reviews

Surveying the Open Source Landscape

May 3rd, 2004
Comments Off on Surveying the Open Source Landscape

It is easy to see the impact that open source software has had on the developer community. A Google search for “open source” turns up over nineteen million results. That’s more than a similar search for “Oracle”, and nearly one-fifth as many as for “Microsoft”, the king of proprietary software.
Read more…