Posts for year 2010
- Assange: The Need To Identify Two Separate Issues
- Building Your Own Network Appliance Part 1
- Projects
- James Brokenshire re-defines Success
- Ignorant Attitudes on Paper
- Wikileaks and Payments - Who's in the right?
- A User's Guide to Data Security and Control
- Howto Install the Realtek 8171 Wireless Driver in Linux
- OpenBSD and the FBI
- Could Governent Subversion Affect Your Business
- Home Office Respond to My Email
- UK Government follows a dangerous path, again!
- Are you getting what your pay for? How to detect ISP Packet Shaping
- UK Government Decides It No Longers Needs Scientific Advice
- Howto Encrypt your Harddrive in Microsoft Windows
- Why is Encryption not used more?
- Getting Started with Linux
- WikiLeaks – What a Fiasco!
- Educating Our Way to Security
- Release needs your help
- Thoughts on Whistleblowers
- Tips on Good Password Management
- Why Censorship on the Net is a bad idea
- Is Ridding the Internet of Porn a realistic objective?
- Update on the Fisher Hargreaves Proctor Security Breach
- Wikileaks releases new material
- Privacy Policy
- Fisher Hargreaves Proctor Suffer Security Breach
- The Software Evaluation and Testing Process
- A Stark Reminder
- Whitepaper: Attack of the Clones - Is Homogeneity in a network environment safe?
- Cannabis: Social Harm or Social Good?
- Religious Group harnesses power of FaceBook to ban gig
- The Link Between Cannabis and Increased Crime Rates
- Fitwatch: Did the Police Overstep their Authority?
- What are Cultural and Historical Reasons
- Are Personal Blogs Compatible With The Business World?
- Will Anonymity ever be impossible on the Internet?
- Analysis of a Compromised GMail Account
- Howto use one instance of tcli for multiple Twitter accounts
- Howto tweet from BASH scripts using OAuth
- Howto Encrypt Your Removeable Media on Linux
- Howto uninstall the Security Tool Scareware package
- An easier method of recovering deleted files on Linux
- Installing and using a T-Mobile ZTE MF626 USB 3G Mobile Broadband Dongle Under Linux
- SeaGate Drives Still Not Playing Ball with AutoPower Saving Mode
- Automatically Generating Google Sitemaps
- Howto Recover Deleted Inodes on an Ext2 Filesystem
- Investigating a full Hard Drive on Linux
- Configuring Locales in Linux
- Welcome To BenTasker.co.uk
- A Developers Guide to Storage and Manipulation of Passwords
- The Importance of Changing Default Passwords
- Maintaining an effective web presence
- Email: Beneficial or Dangerous?
- Best Practice For Network Security in Small and Medium Sized Business
- Benscomputer.no-ip.org
- Understanding the Nigerian 411 Scam
- My Life Has Improved
- Inconsistencies in advice
- Harm is Nothing If Not Relative
- Professor Nutt Confirms What We Already Knew
- A very belated reply to FeMail
- Fallacies P3 – The Home Office are Protecting Our Children
- Fallacies: Cannabis is a truly terrible, dangerous nasty drug – Part 2 of Series
- Fallacies: Pharmaceutical Mistakes of the Past – Part 1 of Series
- Why does the UK Government refuse to help reduce the suffering of many?
- US shows refusal to respect European Privacy Requirements
- Judge Rules: Privacy Controls on Facebook Insufficient
- Storage and Manipulation of Passwords: A Developers Guide
- Thousands of bloggers silenced
- Aussie Comms Minister Puts Foot In Mouth
- South Africa plans Internet Filter
- Twitter Bomb Joker Launches Appeal
- Republished: The courts and the internet - The Love Story unfolds
- Republished: Privacy on the Internet
- How Social Networking Can Be Used To Identify Distributors
- BUGGER Project Listing Plugin
- What is a Computer Virus
- Truth and Fiction in Chain Email
- Republished: Verification, Validation & Testing
- Republished: Tips for fighting password theft