Category Archives: Network Security

Spread Spectrum Modulation Techniques

Wireless Local Area Networking technology today exploits a technology which was thitherto mostly hidden inside the shadowy domain of military communications and radar. This technology comprises a collection of ideas which are termed Spread Spectrum Techniques (SST). Spread Spectrum techniques have … Continue reading

Posted in Collaboration, Cryptography, Data, Home Networking, LAN, Mobile Telephony, Radio Solutions, Satellite Broadband, Small Business Communicate, WAN, Wireless LAN | Leave a comment

The Nessus Vulnerability Scanner

In computer security, Nessus is a proprietary comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. For example: Vulnerabilities that allow a … Continue reading

Posted in Access Control, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Test, Threat Management, Web Security | Leave a comment

Cisco Plays Catchup in DPI Test

If you’re a large enterprise with its own network, an ISP, or a company intent on claiming its own, online, the technology force of Deep Packet Inspection (DPI) is with you. But it may surprise you who shows up on the … Continue reading

Posted in Access Control, Cisco, Cloud Computing, Data, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Optimisation, Optimise, Platform (PAAS), Security | Leave a comment

Which website shopping cart?

We have recently undertaken a study to determine which of the many shopping cart systems we should use on a customers website. After a long process trawling through the myriad of options we finally reached a shortlist of 8 candidates. … Continue reading

Posted in Design and Functionality, Development, E-Business, Electronic Commerce, Network Security, Search Engine Optimisation, Security, Small Business, Small Business Communicate, Uncategorized, Web Security, Web Services | Leave a comment

Security At the Edge: Locking Down the Network Perimeter

When securing your company’s network, it’s best to start on the edges — the perimeter — where the system interfaces with the rest of the world. It’s an approach that makes sense. While installing safeguards deep inside the network is … Continue reading

Posted in Access Control, Cryptography, Fortify, Home Security, Infrastructure Security, Intrusion, Network Security, Resilience, Security, Small Business Secure, Tech Tips, Threat Management, Web Security | Leave a comment

Strong cryptography in PHP

If you are a professional web developer, security is an important aspect of your job. If you are planning to store some critical or sensitive data in your web application, like passwords, credit cards, etc, you should use strong cryptography … Continue reading

Posted in Access Control, Cryptography, Network Security, Security, Tech Tips | Leave a comment

Web Security – The Problem

Web security has changed a lot in the past few years. It is no longer good enough to take a desktop antivirus scan engine and scan web content. URL filtering isn’t enough. It is not enough to put HTTP security … Continue reading

Posted in Cloud Computing, Home Networking, Home Security, Larger Enterprise, Network Security, Operational Efficiency, public cloud, Security, Small Business, Small Business Secure, Software (SAAS), Web Security | Leave a comment

Managed Security Services – Good or Bad?

The buzz word “Managed Security Services” sparks off a religious debate among the staunch believers and critics of this rapidly emerging phenomenon in the world of information security. The supporters vehemently profess that Managed Security Services should be considered as … Continue reading

Posted in Access Control, Cryptography, Infrastructure Security, Innovation, Larger Enterprise, Manage, Network Management, Network Security, Reporting, Security, Small Business, Small Business Secure, Web Security | Leave a comment

How Does Secure Socket Layer (SSL or TLS) Work?

The Secure Socket Layer, SSL for short, is a protocol by which many services that communicate over the Internet can do so in a secure fashion. Before we discuss how SSL works and what kinds of security it provides, let … Continue reading

Posted in Cryptography, E-Business, Electronic Commerce, Network Security, Security, Tech Tips, Web Security, Web Services | Leave a comment

The Wi-Fi killers

Is your Wi-Fi not working? Interference could be getting in your way What’s the number one threat to the smooth running of your Wi-Fi network? Interference, and plenty of it. It isn’t only interference from neighbouring networks that you have … Continue reading

Posted in Access Control, BT, Data, Home Networking, LAN, Netgear, Small Business, Small Business Communicate, Small Business Connect, Tech Tips, Wireless LAN | Leave a comment