Pros and cons of using opensource software in the corporate world.
Author: Shaheen
MythBusters Beat Fingerprint Security System
See how the MythBusters beat fingerprint security system!
IANA Port Numbers
Here is a list of IANA port number – http://www.iana.org/assignments/port-numbers
.Net Security, Java Security and Webservers
Looking for a comparison of security between .Net and Java? Need to know if .Net application is supported in webservers other than IIS?
Prevent Reverse SSH
Can we prevent establishing of reverse SSH tunnel between corporate network and a public domain system?
Security Architecture Definition
The definition of security architecture has never been consistent among experts. While it is a framework for some, it’s a process or a detailed technical design for others.
I Lost Trust in You!
Shaheen shares a personal experience on identity theft
Make a little adjustment for the new Copyright Law
The Canadian Copyright bill was passed yesterday, a bill that demands a little adjustment to our day to day life. Till now, no one cared who is using our internet connection or what are the files being downloaded or uploaded using it. No one cared of your unscrambled satellite videos from across the border. However that’s all changing even though you may not want it that way. I guess no one can withstand the pressure of the “big guys” for too long.
Smartphone Security For Enterprise
Smartphones are now rich in features that include network connectivity, enough storage space with efficient processors. These enter your network through authorized corporate users while others are brought in by employees who purchased it themselves.
People Need to Feel Appreciated
Gregory Smith explains the need to appreciate people.