• July 11, 2006 11 Jul'06

    Thwarting spam from the inside and the outside

    After discovering that stopping email threats takes more than a layer of spam filtering and two layers of virus protection, one law firm added hosted defense to the mix.  Continue Reading

  • July 11, 2006 11 Jul'06

    Microsoft patches seven July security holes, five critical

    The software giant's monthly batch of fixes includes critical repairs for Internet Explorer and Windows' networking features, plus "important" bulletins for Internet Information Server.  Continue Reading

  • July 11, 2006 11 Jul'06

    Inside MSRC: Debunking Excel exploits

    Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletins, offers some Windows networking best practices and says one alleged Excel exploit isn't what it seems.  Continue Reading

  • July 10, 2006 10 Jul'06

    Wired Equivalent Privacy (WEP)

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is ...  Continue Reading

  • July 10, 2006 10 Jul'06

    brute force cracking

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than ...  Continue Reading

  • July 10, 2006 10 Jul'06

    Crash Course: Spyware

    In general, spyware is any technology that aids in gathering information about a person or organization without their knowledge.  Continue Reading

  • July 10, 2006 10 Jul'06


    In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.  Continue Reading