Unix tip: Inter-host trust on Unix, part 2
Ssh provides secure connection methods, but just how secure depends on how you use it. Let's take a look at some of its options and how it's different from rsh.read more
View ArticleForrester: Web 2.0 means paying more attention to security, not less
Holes are opening all over enterprise IT infrastructures, which rely on end-users' memories, not good systems, for good authentication plans. read more
View ArticleA tru.ly useful way to verify identities online
You know who you are, and I know who I am. But how do I know you’re really who you say you are (and vice versa) when we’re connecting on Facebook, or doing a transaction on eBay, or chatting on a...
View ArticleVMware releases cloud security integration tool disguised as virtual iPhone...
VMware's Horizon App Manager is designed to let users pull down the SAAS or internal apps they need from one screen; to do that it needs single-signon abilities nothing else does right now.read more
View Article'Tragically comedic' flaw gives anyone root access to 900,000 Internet servers
It only happens about once every 256 times, and doesn't affect all the millions of MySQL and MariaDB databases that are among the most common apps on the web. 879,000 servers will let anyone log in who...
View ArticleThe Weekly Hash - August 31, 2012
A review of some of the top tech stories for the past week, with tongue planted firmly somewhere near cheek.read more
View ArticleHow to create a session timeout warning for your web application using jQuery
If you've got a web application or SaaS project which requires a user to be logged in, chances are their login will expire at some point.read more
View ArticleThe Weekly Hash - February 22, 2013
Joking about the week’s top tech stories, this week featuring Burger King, Chinese cyberspies and a new Chromebook that will revolutionize the way we watch pornread more
View Article
More Pages to Explore .....