Products

Linux Hardening – Quick Wins

The best way to ensure that your Linux server is secure is to build it from scratch with a minimum amount of code that can be exploited by a hacker -- a custom compiled kernel and t...

More Tips on Removing Viruses and Malware

The first thing to do is determine the validity of any antivirus alerts. A popular malware technique is to display alerts saying a computer is infected in hopes of the user downloa...

Ten Tips to Make Your SSL Secure

If your SSL server have misconfigurations and known vulnerabilities that make it insecure, follow these ten tips to avoid common SSL security mistakes. 1. Disable support for SSL v2...

5 Best Practices for Securing Remote Access

A decade ago, secure remote access was a right enjoyed by a privileged few: road warriors, executives, sales forces, etc. But ubiquitous high-speed Internet connectivity, coupled with explosive growth...

Top 5 PDF Risks and How to Avoid Them

In early 2010, PDF exploits were by far the most common malware tactic, representing more than 47 percent of all Q1 infections tracked by Kaspersky Labs. By mid-year, PDF exploits had fallen to 30 per...

How to: Set Up TrueCrypt Disk Encryption, Part 1

Even if your Windows (or other OS) account is password-protected, thieves can still access your drives and data using simple tools if they aren’t encrypted. Look no further than rec...

Latest articles