• June 05, 2007 05 Jun'07

    Is there any policy or regulation to help protect biometric data?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin examines how authentication credentials, such as biometric data, are in need of more protection from current regulations such as SOX, GLBA and HIPAA.  Continue Reading

  • June 05, 2007 05 Jun'07

    What challenges arise when designing a logging mechanism for peer-to-peer networks?

    In this SearchSecurity.com Q&A, identity management and access control expert Joel Dubin discusses how to track a peer-to-peer network by using open source security tools.  Continue Reading

  • June 05, 2007 05 Jun'07

    Zero-day flaws affect Firefox, IE

    A researcher published details on four new zero-day flaws affecting Firefox and Internet Explorer. They could be exploited to log keystrokes, download malware and steal cookies.  Continue Reading

  • June 04, 2007 04 Jun'07

    van Eck phreaking

    Van Eck phreaking is a form of eavesdropping in which special equipment is used to pick up telecommunication signals or data within a computer device by monitoring and picking up the electromagnetic fields (EM fields) that are produced by the ...  Continue Reading

  • June 04, 2007 04 Jun'07

    profile

    In a Windows environment, a user profile is a record of user-specific data that define the user's working environment.  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS+

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    TACACS

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    Terminal Access Controller Access Control System

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    XTACACS

    TACACS (Terminal Access Controller Access Control System) is an older authentication protocol common to UNIX networks that allows a remote access server to forward a user's logon password to an authentication server to determine whether access can ...  Continue Reading

  • June 04, 2007 04 Jun'07

    spoof

    Spoof was a game involving trickery and nonsense that was invented by an English comedian, Arthur Roberts, prior to 1884, when it is recorded as having been "revived.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close