by wwarren | Sep 19, 2011 | Cloud Computing, Internet, Security
Current ssl secured traffic relies on “third Party” trust. Frankly I think it is stupid. You are going to put your trust in security in a central location and tell others that that third party is better at your security than you are? NO thanks. Comodo...
by wwarren | Sep 19, 2011 | Cloud Computing, Internet, Security, Security Alerts
In order to execute their attack, Rizzo and Duong use BEAST Browser Exploit Against SSL/TLS against a victim who is on a network on which they have a man-in-the-middle position. So in order to “break” the AES component of SSL 3.0...
by wwarren | Jul 9, 2011 | Internet, Security
Unless you have a good product like Astaro protecting your edge i would highly suggest NOT running open wifi. However with the proper precautions in place it is possible to mitigate the possibility of getting tangled up in this. Under the new voluntary...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Microsoft, Security
That’s just the LEGAL way to get at it. There’s very little stopping the illegal ones as well. Thanks to the Patriot Act, US spooks no longer have to waste their time having to crack into European company servers to steal their secrets. They can...
by wwarren | Jul 8, 2011 | Cloud Computing, Internet, Security
It is going to come to pass that the best place to have your data is back on your own systems where you control the security. The cloud with it’s high level of centralization is going to mean your data is just waiting to be stolen. Matt Johansen, a...
by wwarren | Jul 2, 2011 | Internet, Security, Security Alerts
p2p software is a great thing but highly dangerous when not properly configured. By default p2p software shares files..sometimes everything on your hard drive depending on the program used. A good gateway firewall is your best bet if you don’t have airtight...