Rodney Campbell's Blog

2006.08.24 Daily Security Reading

by on Aug.24, 2006, under Security

Email: Compliance and Information Management

Email is fundamental to internal and external communication for many organisations, with 87% of UK businesses highly dependent on electronic information. The nature and sheer volume of information that is shared and stored on email today makes email management critical to IT and corporate governance.

SSH Tunnels: Bypass (Almost) Any Firewall

The goal of this article is to present a few effective methods to revamp the way you work in a restricted corporation-like network. In order to achieve it we’re going to use SSH tunneling to bypass the firewall rules applied by your system administrator. We’ll start with breaking through simple restrictions and gradually pass to more and more elaborate firewalls while we move on.

MS06-042 Internet Explorer Crash is Exploitable

On August 8th Microsoft released MS06-042 which was a cumulative update for Internet Explorer. Over the course of a few days after the release of this patch various Internet Explorer users and businesses started to experience Internet Explorer crashing problems when viewing certain websites. 

Sophos offers free rootkit detection and removal tool

Sophos has announced the availability of a new free-of-charge, standalone tool offering comprehensive rootkit detection and removal capabilities. Sophos Anti-Rootkit complements Sophos Anti-Virus 6.0 and other vendors' anti-virus solutions by providing an additional layer of protection for the Windows NT/2000/XP/2003 operating systems.

IBM to acquire Internet Security Systems

IBM announced on Wednesday that the technology giant has agreed to buy Internet Security Systems, an all-cash deal that the company valued at $1.3 billion, or about $28 a share.

Kevin Mitnick Web sites hacked

Instead of the usual description of Kevin Mitnick, his consulting services and books, the famed hacker's Web site on Sunday displayed a vulgar message.

Tip of the Day – PHP Security

For all of us here coding in PHP I put together a couple of configuration tips to provide an extra layer of security. Now while all of your own applications are of course bug free and will never get exploited, you just may have to use some third party code once in a while.

Comments are closed.

Looking for something?

Use the form below to search the site:

Still not finding what you're looking for? Drop a comment on a post or contact us so we can take care of it!

Copyright © 2015 Rodney Campbell

Images contained on this web site may not be used or reproduced in any way without prior permission.