Securing Microsoft Office
SecurityFocus has posted a two part article on securing Microsoft Office, written by Khushbu Jithra. It’s a pretty good article combo with the first article talking about Office’s security issues and...
View ArticleSkype Security
I use Skype fairly regularly as do many people I know. In fact, you can Skype me at chrisharringtonor leave me voicemail at 603-397-3392 (also Skype). Over the past couple months I have seen some...
View ArticleURL Obfuscation Examples
Web browsers understand all sorts of URL formats. If you want to go to Google you put http://www.google.com in your browser. These URL’s are also valid for Google as well: http://1208930147 and...
View ArticleNSA’s guide to securing routers
My old pal’s from the System Network and Attack Center at the NSA have a great guide on securing routers. The Router Security Configuration Guide has a good amount of the networking basics and then...
View ArticleSome things to look for in your SecurID / Remote Access logs
The RSA SecurID token has arguably been the defacto second factor authenticator for many years. Despite the recent breach at RSA I do not see many organizations moving to alternate vendors or other...
View Article
More Pages to Explore .....