Recovering from a drive-by Java attack via fake security messages Mark Underwood describes how he recovered a user's system from a drive-by Java attack. How do you protect users from fake security messages and deliver the security updates that they do need? Read more Why not use OpenPGP for Web authentication? TLS is the default solution for strong encryption on the Web, but perhaps it should not be. Why has no alternative arisen to challenge it, despite all of the problems of TLS encryption? Read more Filtering PF firewall logs The PF firewall's pflog facility provides a powerful, flexible set of capabilities for generating network traffic logs. Because it stores logs in tcpdump's native pcap format, a wide range of... Read more |
No comments:
Post a Comment