Privacy, Security Archive

Calling Components Safely

Clicking on a hypertext link while viewing a PDF file shouldn't be a security problem as long as you trust the viewer it invokes. But users of xpdf version 0.90 discovered that this assumption was an extremely bad one. When an xpdf user clicked on a hypertext link, xpdf started up a viewer (Netscape by default) and sent the URL to the viewer. So far, so good. But the xpdf developers decided to start up the viewer by using the system() call. That was the bad idea..

Security Risks In The Wireless Computing Environment

This article will address at a summary level the most significant security risks in the wireless computing environment. The purpose of the article is to introduce in a centralized fashion the scope of the problem and the most significant talking points on the issue of wireless security and to summarize where the industry is in addressing these problems and where it is going.

Microsoft To Offer Anti-Spyware Tool

Within 30 days, Microsoft will have a tool available to remove spyware from Windows PCs. The tool comes from a small company called Giant Company Software that Microsoft recently acquired. The anti-spyware tool will initially be free, but Microsoft has stated that it may eventually charge for the program. Update: It seems that another company has co-ownership of the code that Microsoft bought in this acquisition.

The solution to many logins and passwords

Remembering all the logins and passwords to all the services and systems you've got access to is pretty hard to do nowadays. Many people use the same login and password for multiple sites and systems. That won't improve security. One of the IT buzzwords is SSO (Single Sign-on). Most SSO systems are hard to setup and will only provide SSO to the systems of one company. It is possible to easily provide worldwide single sing-on.

Securing Windows XP

This guide will show you how to secure Windows XP. While it covers the basics it also goes beyond them without going into "paranoid" mode...This guide is for home users in a stand-alone or workgroup environment. It is intended as a step-by-step guide and we highly suggest you read through the entire article before taking any action. We welcome suggestions and feedback.

Java and .NET security

SUN Microsystems Java and Microsoft's .NET platforms are no more than programming languages that exploit network potential with the idea that the same software should function on different platforms. Both systems are centered around the principle of running software that doesn't reside on the client machine to provide greater functionality or faster execution, saving connection time and improving public perception of the server to which the client connects. Read Article

Security for Internet Users Deemed Weak

Home internet users are suffering from a variety of worms, viruses, and spyware on their machines, and though they are often aware that their computers are acting funny, they often don't have any idea why. Typical home users are not taking the necessary steps to protect themselves from these online threats. These are the findings of a recent study on internet security.