Viewing posts tagged Open Source
PHPBB password analysis
Posted by: admin 15 years, 10 months ago
Dark Reading has an analysis of the passwords exposed in the recent PHPBB attack. It's interesting and I'm sure that people do use passwords that are too simple. However, the fact that you can analyize the passwords proves that it makes no difference what password you choose! So, the simple the better until the site moves up to two-factor authentication.
Interview on preachsecurity.blogspot.com
Posted by: admin 15 years, 10 months ago
There's an interview with me on Preach security. It mostly discusses two-factor authentication, open source software and cloud computing.
How an open source tool cratered the economy
Posted by: admin 15 years, 10 months ago
A while back (still catching up on my blogging since the site update), there was a great article on risk management. You will need to read the whole, long but worth-while article to understand what's doing on. I found this bit interesting:
how-to-get-microsoft-esque-security-with-open
Posted by: admin 15 years, 10 months ago
I was duly impressed with the recent ComputerWorld article about how Microsoft fends off 100,000 attacks per month. That is a lot of attacks! The article doesn't mention what Microsoft has spent on security, but my guess is: More than your company's revenues. So what is a poor company to do? Like wine, it is easy find a good bottle of $30 wine, the challenge is finding a good bottle of $8 wine (and were talking magnum). Luckily, thanks to open source software and the many tools built into Linux, even the stingiest of companies can have good security.
picking-open-source-winners-according-to-zdnet
Posted by: admin 15 years, 10 months ago
Dana Blankenhorn has written about picking winners in open source that starts with a reference to Secretariat. I love horse racing. I spent two summers in my youth as a hot-walker in southern California for a trainer named Willard Proctor. A hot walker walks horses around in a circle, either just to get them out of the stall or to cool them down after they come off the track. It's the lowest position in the backside of any track. The best trainers still use people though and not machines. Our barn was next to Charlie Whittingham's.Recent Posts
- Blast-RADIUS attack
- The latest WiKID version includes an SBOM
- WiKID 6 is released!
- Log4j CVE-2021-44228
- Questions about 2FA for AD admins
Archive
2024
2022
- December (1)
2021
2019
2018
2017
2016
2015
2014
- December (2)
- November (3)
- October (3)
- September (5)
- August (4)
- July (5)
- June (5)
- May (2)
- April (2)
- March (2)
- February (3)
- January (1)
2013
2012
- December (1)
- November (1)
- October (5)
- September (1)
- August (1)
- June (2)
- May (2)
- April (1)
- March (2)
- February (3)
- January (1)
2011
2010
- December (2)
- November (3)
- October (3)
- September (4)
- August (1)
- July (1)
- June (3)
- May (3)
- April (1)
- March (1)
- February (6)
- January (3)
2009
- December (4)
- November (1)
- October (3)
- September (3)
- August (2)
- July (5)
- June (6)
- May (8)
- April (7)
- March (6)
- February (4)
- January (427)
2008
- December (1)
Categories
- PCI-DSS (2)
- Two-factor authentication (3)
Tags
- wireless-cellular-mobile-devices (7)
- Two-factor authentication (10)
- Wireless, cellular, mobile devices (6)
- NPS (1)
- Phishing and Fraud (111)
- Active Directory (1)
- pam-radius (3)
- privileged access (2)
- Cloud Security (10)
- Mutual Authentication (60)
- Web Application Authentication (1)
- Authentication Attacks (99)
- pci (50)
- Security and Economics (97)
- WiKID (133)
- pam (2)
- VPN (1)
- Installation (2)
- RADIUS Server (1)
- Open Source (64)
- Tutorial (2)
- Strong Authentication (35)
- Information Security (137)
- Transaction Authentication (13)
- Miscellaneous (100)
- Linux (2)
- transaction-authentication (6)
- Two Factor Authentication (254)