Category: network
In the physical world, we’re overloaded with ways to identity ourselves. We have identity cards, driving licenses, passports, health insurance cards and a myriad of other forms of identification …
I once met a project manager who really didn’t enjoy the testing phase of a project. He was one of those time driven managers where milestones and targets were …
Is privacy a right, or in this world of terrorist threats is it something that we have to accept as a price to pay for keeping us safe. For …
Online anonymity is important to many people for a variety of reasons. If you are unlucky enough to live in a country where the state controls and prosecutes people …
One of the most useful protocols to understand especially when troubleshooting networks is that of the address resolution protocol. This is used to map internet addresses to hardware addresses …
Attacking large corporate websites, either through sabotage because the attacker is a disgruntled employee or disagrees with the company’s ethos, or to extort money from the company is becoming …
It is important that management be involved in all stages of developing an ISMS for your business however there is a formal stage where they must review the documents …
This British Standard has been ready for business managers and their staff to provide a model for setting up and controlling your stresses an efficient Information Security Management System …
Cloud computing is a powerful tool which helps to make online meetings very close to reality. This is because the cloud services are scalable and flexible which is very …
In 2000, an internal test tool was written which was expected to be used by only two or three people. It started as something quite simple, little more than …