Category Archives: Cryptography

Spread Spectrum Modulation Techniques

Wireless Local Area Networking technology today exploits a technology which was thitherto mostly hidden inside the shadowy domain of military communications and radar. This technology comprises a collection of ideas which are termed Spread Spectrum Techniques (SST). Spread Spectrum techniques have … Continue reading

Posted in Collaboration, Cryptography, Data, Home Networking, LAN, Mobile Telephony, Radio Solutions, Satellite Broadband, Small Business Communicate, WAN, Wireless LAN | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

Strong cryptography in PHP

If you are a professional web developer, security is an important aspect of your job. If you are planning to store some critical or sensitive data in your web application, like passwords, credit cards, etc, you should use strong cryptography … Continue reading

Posted in Access Control, Cryptography, Network Security, Security, Tech Tips | Leave a comment

Managed Security Services – Good or Bad?

The buzz word “Managed Security Services” sparks off a religious debate among the staunch believers and critics of this rapidly emerging phenomenon in the world of information security. The supporters vehemently profess that Managed Security Services should be considered as … Continue reading

Posted in Access Control, Cryptography, Infrastructure Security, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Reporting, Security, Small Business, Small Business Secure, Web Security | Leave a comment

How Does Secure Socket Layer (SSL or TLS) Work?

The Secure Socket Layer, SSL for short, is a protocol by which many services that communicate over the Internet can do so in a secure fashion. Before we discuss how SSL works and what kinds of security it provides, let … Continue reading

Posted in Cryptography, E-Business, Electronic Commerce, Network Security, Security, Tech Tips, Web Security, Web Services | Leave a comment

Just what is IPSec (IP Security) – ESP?

IPSec is a topic which, when broached, often elicits blank stares and, or often, puzzling comments on it. This area of computer security and protocol usage is one that definitely bears further scrutiny as it impacts both home users and … Continue reading

Posted in Cryptography, Network Security, Security, Small Business, Small Business Secure, Tech Tips | Leave a comment

Cloud Computing Used to Hack Wireless Passwords

German security researcher Thomas Roth has found an innovative use for cloud computing: cracking wireless networks that rely on pre-shared key passphrases, such as those found in homes and smaller businesses. Roth has created a program that runs on Amazon’s … Continue reading

Posted in Access Control, Cloud Computing, Cryptography, Fortify, Home Networking, Home Security, Intrusion, Network Security, public cloud, Security, Small Business, Small Business Secure, Software (SAAS), Test, Wireless LAN | Leave a comment

Breach in the trust of the global public key infrastructure

In a recent press release on Privacy Digest, there is a discussion of some major and well known vulnerabilities in the global public key infrastructure (PKI) and some examples of exploitations of that vulnerability. The issue is with the proliferation … Continue reading

Posted in Cryptography, Network Security, Security | Leave a comment