Whitepapers
- Details
-
Published: Friday, 17 December 2010 20:32
-
Written by Ben Tasker
The Internet is awash with speculation following allegations that the IPSEC cryptographic stack in OpenBSD was furnished with a backdoor at the behest of the Federal Bureau of Investigation (FBI).
The allegations were made by Gregory Perry in an e-mail to one of the founders of NetBSD - Theo De Raadt – and were published on the BSD mailing lists so that a code audit can be undertaken by those with an interest in doing so.
If such a backdoor does exist, it could allow the FBI (and conceviably others) to decrypt communications between servers, whether those communications take place over a Virtual Private Network (VPN) or over a Secure Shell Connection (SSH).
This whitepaper will examine the precedents for this allegation as well as the potential impact that such a revelation could have on businesses around the world.
You can read more here.
- Details
-
Published: Sunday, 28 November 2010 16:22
-
Written by Ben Tasker
Management love homogeneous networks; they reduce the amount of training needed, the number of IT Technicians to offer support and, of course, offer an opportunity to obtain bulk discount through volume licensing.
But in pursuing lower capital and maintenance costs, are these same managers opening their networks to attack?
Read more: Whitepaper: Attack of the Clones - Is Homogeneity in a network environment safe?
- Details
-
Published: Friday, 17 June 2011 15:42
-
Written by Ben Tasker
A paper detailing the technical issues with filtering the internet (including examples of how easy filters are to circumvent). Aimed at the average user including parents concerned about what their children are viewing on the Internet.
Viewable as a webpage here or downloadable here.
- Details
-
Published: Tuesday, 09 November 2010 21:06
-
Written by Ben Tasker
Very few businesses can function without a network of computers. Be they Windows or *NIX
based, communication is the name of the game. Unfortunately allowing your computers to
communicate with each other does have inherent risks, whether that be malware or unauthorised
access.
Read more: Best Practice For Network Security in Small and Medium Sized Business
- Details
-
Published: Friday, 12 November 2010 20:54
-
Written by Ben Tasker
Social media is experiencing huge growth, more and more people are both using social networks such as Facebook and running their own blogs and websites. This, however, has led to a worrying trend of companies using the content of personal blogs to discipline it's employee's.
Read more: Are Personal Blogs Compatible With The Business World?