Sunday, May 20, 2007

Weekend Reading

Why VPN can’t replace Wi-Fi security

Every time the subject of wireless LAN security comes up, people ask me about VPN as a solution for securing Wi-Fi. (Wi-Fi is the common marketing name for 802.11 wireless LANs). I've always told people that VPN security shouldn't be a substitute for good Wi-Fi security, and I even posted a comprehensive guide to enterprise wireless LAN security, but a loyal group of VPN-only supporters has always argued for a VPN-only alternative. I'm going to explain VPN and Wi-Fi security as best I can and why there is a right time and right place for each architecture.

Take a look HERE.

==================================================================
Ross Anderson

Ross Anderson is the professor of security engineering at Cambridge. The Federal Reserve commissioned him to write a paper on fraud, risk and nonbank payment systems for their Santa Fe Conference on bank regulation. It turns out that phishing is made easier by payment systems like eGold and Western Union which make the recovery of stolen funds more difficult. He suggested suitable improvements in regulation.

Take a look HERE.

==================================================================
Linux too vanilla? Try this -

So, getting increasingly desperate, I thought I'd give PC-BSD a whirl. This is a distro of FreeBSD tweaked for an easy desktop install. It went on first time, no hesitation. Even booting from the install CD, it found the Cardbus slot, found my old Xircom RealPort Ethernet card, connected and went online - which is a damn sight more than Ubuntu could do until I'd apt-getted it into submission. It cheerfully ran the setup program in 1024x768, the native resolution of the LCD.

Take a look HERE.

==================================================================
Up Close With David Maynor

Today he's kind of a jack-of-all-trades hacker who digs into Microsoft software bugs as well as wireless driver vulnerabilities, such as the one he and fellow researcher Jon Ellch demonstrated at Black Hat USA last August. "I like focusing on things than can be used to break into your computer or steal information or do bad things to you. If you think about the typical, motivated hacker-for-hire, he's not going to be [an expert in] wireless-only. The enemy is cross-disciplinary, and so should you be."

Take a look HERE.

==================================================================
Threats “In the Wild” - ascertaining your true risk

Once upon a time, back when viruses were primarily created for reasons other than financial ones, there were quite a number of viruses which existed solely in the confines of virus research labs. That is to say, they had never infected a “real person’s” computer.

Take a look HERE.

==================================================================
The Essential Guide to Piracy

Piracy is an action sport. The ability to infringe copyright and steal valuable work induces a rush like no other. Whether you steal music, movies, books, applications, or whatever, it feels like breaking the law and it saves our wallets and purses from becoming empty. But not everyone is as fortunate as we are to know the ins and outs of the world of piracy. There’s so much to take in and only so much time for us to Google around for the answers to our questions. Luckily, you have a master pirate on deck to help you with understanding the basics that will get you downloading Spiderman 3 in no time.

Take a look HERE.

0 Comments:

Post a Comment

<< Home