The Latest in IT Security

Posts Tagged ‘accesses’

05
Oct
2011

I had an unpleasant surprise when I connected a new Cisco 887W router I had just configured to the Internet via its ADSL interface.As it was the first time I worked with a 887, I did an nmap scan of its ADSL interface to check that I had closed all ports. Surprise: ports 2002, 4002, […]

Read more ...

There have been two recent occasions on which my computing life has been influenced by Lord Sugar, the business mogul who founded Amstrad and the star of BBC One’s reality TV show “The Apprentice”. The first was on a visit to the National Museum of Computing at Bletchley Park, where I got to use an […]

Read more ...

Two researchers have shown how a modded version of the Firesheep Wi-Fi sniffing tool can be used to access most of a victim’s Google Web History, a record of everything an individual has searched for. The core weakness discovered by the proof-of-concept attack devised by Vincent Toubiana and Vincent Verdot lies with what is called […]

Read more ...


Categories

MONDAY, FEBRUARY 24, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments