security too secure
Summary: security too secure
The security thing won't let me in this sight no matter how I accept,
confirm, get certificate, etc.
Browser Details: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.4; en-GB; rv:1.9.1b4) Gecko/20090423 Firefox/3.5b4
From URL: http://hendrix.mozilla.org/
Note to readers: Hendrix gives no expectation of a response to this feedback
but if you wish to provide one you must BCC (not CC) the sender for them to
...How secure is secure?
Thanks to this group and all the high tech individuals who frequent it I
have learned how to protect my PC from the inside out. But what about
security risks to my info 'before' it gets to my computer? Like my mail
box on the server. Could someone hack into that and thumb through my
If so, how would I ever know?
(The short story)
We have a rogue employee at my work who one day decided to run the web
site, she got in tight with the ISP, got tools to set and delete
passwords on a protected directory on the server. Who knows if she has
telnet access to other things, li...when is secure, secure?
I wrote a custom authentication handler for PureFTPD, using a combination of
authentication methods, for about 4 different types of users.
So far, from testing it, it does look to work properly, and does it's job
pretty well (and fast). I use #!/usr/bin/perl -W as well as use Strict, and
use warnings, and the code returns no errors or warnings when run.
I am right to presume that this basically only really tells me the my syntax
and structure of the application is right? What's a good way to see whether
it is actually SECURE... There is a couple of lines of...Software [In]Security: Twitter Security
Making Your Thoughts as Small and Incomplete as Possible
Just for the record, I don't use Twitter. But if this column were a Twitter
entry, it might read something like:
"If U know neither the enemy nor yourself,U will succumb in every battle"
...Is security software becoming a security risk?
"Due to bugs in antivirus software, the security suite becomes a risk
by itself, and adding multiple pieces of security software makes the
problem worse, not better "...
john s. smith wrote:
> "Due to bugs in antivirus software, the security suite becomes a risk
> by itself, and adding multiple pieces of security software makes the
> problem worse, not better "...
...F-Secure Readies Security Software For Linux
F-Secure Corp. on Tuesday unveiled security software for open-source Samba
file servers and Linux, addressing a need that's growing within the
The Finnish company announced the availability of antivirus software for
Samba that automatically detects and removes viruses from files stored on
the server. The new product is meant to protect all Samba-attached computers
from malicious code that could enter the network from a Windows or Linux
Next month, F-Secure plans to ship a Linux version of F-Secure Policy
Manager, which will extend centrally managed ...What do security guards and computer security software have in common???
"Nothing is more damaging to a new truth than an old error"
...Security software to secure USB flash drives?
does anyone know of some software (preferably freeware that would
password protect access to a USB flash drive?)
Currentlty the drive I have is open wide as soon as it is plugged in.
Any help would be appreciated.
Calculating in binary code is as easy as 01,10,11.
Paul Jackson wrote:
> does anyone know of some software (preferably freeware that would
> password protect access to a USB flash drive?)
> Currentlty the drive I have is open wide as soon as it is plugged in.
> Any help would be appreciated.
>...Securing Your Starbucks Experience: How to surf wifi securely
followup to grc.security.wireless
Securing Your Starbucks Experience: How to surf wifi securely
First, unless you absolutely know otherwise, assume that every
hotspot you're likely to encounter is totally open and unsecured.
This means that anything you send between your laptop and the access
point is in the clear, and anyone sniffing the signals will be able
to read everything that goes to or from yo...Book Review: Software Security
I'm jealous. No seriously. If Cigital is actually ran as depicted in the
book Software Security - Building Security In, I have to give kudos to Gary
and the gang for making an impressive environment for software security.
I'm a fan of Gary's writing. If you are a regular reader, you know I loved
both his books on Building Secure Software and Exploiting Software. This
latest book is, in my mind at least, a balancing act between the two
previous books on the topic. Gary calls it the "Ying and Yang". Which makes
total sense, since the book cover is of exactly that, ...Secure connections: how secure are they?
......... both useful and malicious information can be transmitted via network
connections. Standard solutions protect computers against threats present in
standard network connections, but aren't able to counter threats present in
secure connections. Verifying the contents of a secure connection is
impossible by virtue of its secure nature, as demonstrated by the different
types of protection listed above. As a result, malicious data within secure
channels can cause a significant amount of damage, and sometimes more than if
it were to be transmitted via a standard, non-s...Password secure...is it secure?
Yes I just got this baby and I LOVE it! Its great. I have stored all my
passwords inside of it (and yes made a few backups from them in secure
locations) How secure is this program really? It uses blowfish to encrypt
the database but how strong blowfish? 128bits? 256? 448?
Anything else I should think about it? I have putted it and its databases
inside PGPdisk just to play it safe...but then again Im a paranoid. :)
My privacy related homepage and PGP keys:
********...How secure is secure enough?
July 28, 2008 (Computerworld) This story originally appeared in
Computerworld's print edition.
If there is a Holy Grail in the information security industry, it surely is
the answer to the question, "How secure is secure enough?"
It's a question that many security managers have either avoided answering
altogether or tried to quickly sidestep by throwing a fistful of mainly
pointless operational metrics at anyone who cared to ask.
"Never d...How secure is AuthenticationTypes.Secure?
I understand that AuthenticationTypes.Secure requests secure authentication using Kerberos or NTLM (??). However, here is a scenario I am trying to understand. Let us say that I am having a regular ASP.NET site - with SSL certificates not installed on the web server. The login sends the request out to an AD server which also does not have certificates installed. However, I have set Secure flag to AuthenticationTypes.Secure. When the username and password data gets transmitted between the application and the LDAP server, how secure are the password and username info? In other words is this in...