dcsimg

Articles by Jeffrey Carr 

Anti-Forensic Methods Used by Jihadist Web Sites

Extremists use a wide array of techniques to further their cause online

Snort: Open Source Network Intrusion Prevention

The open source security software has earned a place in some prestigious outfits, including the U.S. military.