December 2005

  • The pros and cons of FTP over SSL

    Compare and contrast the pros and cons of having hosts send PGP-encrypted files to an existing FTP site against building an ad hoc FTP server using SSL, in this Ask the Expert Q&A

  • Sony settles DRM rootkit lawsuit for cash, 'clean' music

    The entertainment giant agrees to give away millions of free music and stop using the prying software that got it into legal trouble. Texas, however, is still pursuing its own legal action.

  • 2006 outlook: Open source, offshoring, Web 2.0

    Former TechTarget editor-in-chief Paul Gillin predicts the top 10 technology trends for 2006, including open source, Web 2.0, blogging, offshoring and convergence.

  • Windows image flaw now 'extremely critical'

    Users are being warned to avoid surfing untrusted sites as an exploit in Windows image files spreads in the wild and Microsoft has yet to release a patch.

  • Geeks weigh in on the best movies of 2005

    From the historic dawn of Darth Vader to a much-hyped movie that ultimately spelled box-office Doom, IT geeks say 2005 was a mixed bag when it came to the types of far-out films they like best.

  • 2005 -- The year of the IT blockbuster

    Get your popcorn, grab a seat and check out our comical review of IT sagas you'll never see on the big screen.

  • Web application variable manipulation

    Learn what happens to a Web application that uses two certificates: a client-side SSL certificate and a server-side certificate, and whether this certificate combination prevents Web application ma...

  • SOA standards searched for maturity in 2005

    A host of Web services transaction and security specifications designed to improve quality of service hit the standards track in 2005.

  • Security Bytes: New threats target IM chatters, Web browsers

    A new Trojan hopes MSN Messenger users take the bait; a zero-day vulnerability could make life miserable for Web browsers; and Marriott is the latest to confess to lost backup tapes.

  • Tips for securing iPods in the enterprise

    Despite the dangers iPods pose to the corporate network, your users may have a legitimate business reason for using them. If you can't ban them outright, here's how you can minimize their risk.

  • Geek giggles: The top 10 Missing Links of 2005

    So we're only half-telling the truth. We like to think these wacky tech-related stories kept our readers smiling longer than it takes to hit the delete button.

  • 2005's IT winners and losers

    There were plenty of candidates in both categories this year, but TechTarget editors painstakingly separated the best from the worst.

  • Synching passwords between an iSeries and Windows network

    Learn whether it is possible to synch passwords between an iSeries and a Windows network, and, if there a way to synch password between multiple iSeries, in this Ask the Expert Q&A.

  • CSOs seek regulatory sanity in 2006

    IT security officers long for a common system to comply with laws that are similar, but often have conflicting demands. Some say a single set of federal guidelines could help, but others fear the i...

  • Spyware, application attacks to be biggest 2006 threats

    Security experts say virus writers will turn their attention to spyware in the year ahead, victimizing many still-unsuspecting users. Application-specific attacks, phishing and data exposures will ...

  • Gaining access using application and operating system attacks

    In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security prof...

  • Best practices for risk management programs

    In this Ask the Expert Q&A our security management guru reviews a variety of standards and methodologies to determine what and how to use them throughout an organization's information security prog...

  • PING with Marcus Sachs

    In an interview with Information Security magazine, Marcus Sachs, a director in SRI International's Computer Science Laboratory, explains what it means to direct the Department of Homeland Security...

  • Sony struggles to regain trust

    The company is trying to mend a reputation bruised over its antipiracy practices. One advocate for online civil liberties explains why redemption is a long way off.

  • Hacker holiday greetings: Social engineering tactics

    While hackers may have a myriad of programs and exploits to choose from, they all pale in comparision to their numbe one weapon: social engineering. In this tip, contributor Tony Bradley provides s...