Blog

Make sure your VPN is secure...


There is now a tool that can easily crack PPTP authentication, which is what is used in the basic Virtual Private Networking standard included in Windows. Because of its wide deployment, PPTP is perhaps the easiest type of VPN to deploy--but it should no longer be considered secure.

Read More

Hard Passwords made easy


Why use a strong password

In the online world, security plays a role in all online activities. Passwords are the most commonly used method to limit access to specific people. In last month's newsletter, we discussed assessing the relative value of systems protected by passwords, and grouping passwords across locations with similar trustworthiness.

In a nutshell, don't bother creating and remembering strong passwords for low value systems, and certainly don't use the same passwords for low value systems that you use in high value systems.

Read More

Not all TCO studies favor Microsoft


In Australia, at least, it appears that deploying Linux results in an overall cost savings of at least 27% in a medium-sized company over Microsoft solutions. And that's not even counting costs associated with viruses and downtime during reboots!

Read More

Bluetooth Security issues


Wired magazine is running a story about "bluesnarfing," the practice of sniffing out your address book or calendar, making calls with your phone, and other more nefarious activity, hijacking your phone via Bluetooth. A must read.

Read More

Smarter Password Management


The problem with weak passwords

Your dog's name. Your anniversary. Your childrens' initials, birthday, or birth weight. Your favorite hobby, or the name of your boat. Which one do you use for your password? Network Administrators and hackers know that most people choose passwords like these to protect anything from logging into web-based bulletin boards to buying things online.

Why does it matter? Identity theft. Corporate espionage. Loss of your data, or digital photos. Do you want to risk these things? In many cases, a weak password is all that separates your data from any bad guy who chooses to impersonate you online, or worse.

Read More

Roundup of Wiki engines


Shlomi Fish has written a summary of a few Wiki Web engines based on Perl, Python, or PHP. This is a good starting point for identifying a good Wiki for your purposes.

Read More