• November 30, 2005 30 Nov'05

    New algorithm promises to secure P2P content

    Three cryptographers have developed a secure P2P content distribution method without creating bottlenecks, and it could prove to be a significant breakthrough in the encryption arena.  Continue Reading

  • November 29, 2005 29 Nov'05

    How to tame Google Desktop

    Although not classified as spyware, if left unmanaged and unmonitored desktop search engines, like Google Desktop, can introduce serious security concerns. This tip examines these risks and explains how to block or secure Google Desktop in the ...  Continue Reading

  • November 29, 2005 29 Nov'05

    Sun fixes multiple Java flaws

    Attackers could exploit flaws in the Java Runtime Environment and Management Extensions to read and write local files or execute applications.  Continue Reading

  • November 28, 2005 28 Nov'05

    Opera: Another contender in the browser wars

    Opera Software removed the ad banners and dropped the licensing fees from its browser, making Opera a viable alternative to Internet Explorer. Learn how Opera compares to Firefox in terms of security measures and the drawbacks of using an ...  Continue Reading

  • November 28, 2005 28 Nov'05


    Zotob is a computer worm used by an attacker to gather personal and financial information from computers running Microsoft Windows that have a buffer overflow vulnerability. Zotob, which has several variants, is an outgrowth of a worm called Mytob.  Continue Reading

  • November 28, 2005 28 Nov'05

    How Kerberos, PKI and IPsec interoperate

    In this Ask the Expert Q&A, our identity and access management expert explains how these three unrelated systems interoperate to authenticate and manage digital certificates.  Continue Reading

  • November 28, 2005 28 Nov'05

    How different DBMSes implement Internet database security

    Learn what it takes to achieve comprehensive DBMS security, in this application security Ask the Expert Q&A.  Continue Reading