Whitepapers

Could Governent Subversion Affect Your Business

The Internet is awash with speculation following allegations that the IPSEC cryptographic stack in OpenBSD was furnished with a backdoor at the behest of the Federal Bureau of Investigation (FBI).

 

The allegations were made by Gregory Perry in an e-mail to one of the founders of NetBSD - Theo De Raadt – and were published on the BSD mailing lists so that a code audit can be undertaken by those with an interest in doing so.

 

If such a backdoor does exist, it could allow the FBI (and conceviably others) to decrypt communications between servers, whether those communications take place over a Virtual Private Network (VPN) or over a Secure Shell Connection (SSH).

 

This whitepaper will examine the precedents for this allegation as well as the potential impact that such a revelation could have on businesses around the world.

 

You can read more here.

 

Whitepaper: Attack of the Clones - Is Homogeneity in a network environment safe?

Management love homogeneous networks; they reduce the amount of training needed, the number of IT Technicians to offer support and, of course, offer an opportunity to obtain bulk discount through volume licensing.

But in pursuing lower capital and maintenance costs, are these same managers opening their networks to attack?

 

Read more: Whitepaper: Attack of the Clones - Is Homogeneity in a network environment safe?

Paper: Why Internet Censorship Does Not Work

A paper detailing the technical issues with filtering the internet (including examples of how easy filters are to circumvent). Aimed at the average user including parents concerned about what their children are viewing on the Internet.

 

Viewable as a webpage here or downloadable here.

Best Practice For Network Security in Small and Medium Sized Business

Very few businesses can function without a network of computers. Be they Windows or *NIX
based, communication is the name of the game. Unfortunately allowing your computers to
communicate with each other does have inherent risks, whether that be malware or unauthorised
access.

 

Read more: Best Practice For Network Security in Small and Medium Sized Business