Category Archives: Tech Zone
compiled from source = bad security practice
Today I saw a ‘how-to’ of what is supposed to be the ‘perfect server‘ setup. Well, the ‘perfect’ was not meant literally, but the setup is in fact very nice – from a functional point of view. Open source is …
How to prevent Virtual Theft
We have talked a lot about theft in the real world so I guess it is about time we also discuss theft in virtual world. The BBC reported that some Trojan software are now targeting Online Games and stealing login information …
Search Engines, Friend or Foe?
Security is all about identifying threats and provisioning for them before your enemy exploits that threat. There are so many vectors to take care of that it truly is a daunting task. Input validation, perimeter control, user education, cryptography, physical …
Protecting against Money Theft
Time and time again we read stories about malicious people using Trojans to steal money. This time it happened to Cumberland County Redevelopment Authority where, by using a Trojan, a malicious hacker stole nearly half a million dollars. Brian Krebs …
Security vs. Productivity in the Workplace
Conventional wisdom has always told us that when it comes to deciding what users should be allowed to do, the correct choice would be to allow access only to what they need to do, or more accurately, to allow the …
Copy and Paste is not working on my Remote Desktop Connection… what’s wrong?
A very annoying occurrence that I sometimes suffer is when all of a sudden the copy and paste function stops working when I am connected to a remote machine. Turns out the problem is coming from a little process called …
The Dangers of Social Networking
Social sites such as Facebook and MySpace are a big hit nowadays; not just with the young generation but with people of all ages. It’s an amazing platform for people to connect but it certainly isn’t without its dangers. As …
Into uncharted territory
I decided to go a bit further than usual, and push the limits of the unknown. I decided to install Funtoo, a Gentoo based distro or rather fork, by the Gentoo fouder Daniel Robbins. Daniel is no longer active in …
Vulnerability Related Standards
Security vulnerabilities in software applications are the most important factor that helps malware to spread. The number of known vulnerabilities is increasing every day. Vulnerability databases like National Vulnerability Database, SecurityFocus or Secunia publish thousands of new vulnerabilities each year. …
Could Cross Platform be used as a means of redundancy?
I came across a story by Nick Farrell of the Inquirer about a case that happened to an Australian Power company. The crux of the story is that a virus infected the company’s infrastructure and was spreading inside the network. …










