What are the Critical Security Controls per US federal organizations? Important points and thoughts.
Vulnerability During City Strike
Toronto is on a strike. Dumpster diver may have access to public garbage dump sites.
Vacation Time Phishing Time
June 2009 marks the highest rate of phishing attack to date. Why is this happening? What could we do? What is the trend?
Paranoid on Facebook
Shaheen’s thoughts on using Facebook
Protect Medical Records
Do we trust our medical history with our physicians and hospitals? Such information need to be encrypted or obfuscated.
Chrome OS, Cloud Computing and Privacy
Shaheen’s thoughts on upcoming Google Chrome OS; how does it relate to Cloud Computing and Privacy concerns.
Open Source Software in Corporate world
Pros and cons of using opensource software in the corporate world.
MythBusters Beat Fingerprint Security System
See how the MythBusters beat fingerprint security system!
IANA Port Numbers
Here is a list of IANA port number – http://www.iana.org/assignments/port-numbers
.Net Security, Java Security and Webservers
Looking for a comparison of security between .Net and Java? Need to know if .Net application is supported in webservers other than IIS?