Cookies are small text files that some websites put on user’s computer to store a variety of information about the user and user preferences. Continue reading “Tech Demystified – Cookies”
Security risks involved in VoIP implementation include denial of service (DoS), service theft, unauthorized call monitoring, call routing manipulation, identity theft and impersonation, among others. Continue reading “Securing VoIP – Part 2 – Technology”
At the CanSecWest security conference held earlier this year, IE, Firefox, Safari & iPhone were taken down within minutes. The fully patched systems went down to remote exploits which only goes to show how insecure internet facing systems are.
This final part of the article on SOA security deals about technology involved in securing WSOA (Web SOA) Continue reading “SOA Security – Part 3”
Most of us know that a website is secure if there is a ‘lock’ icon in the browser frame. Let us find out what this lock means and how it enables us to know whether a site is secure. Continue reading “Know the ‘lock’ icon on your browser”
Since 1981, TCP/IP has been built on version 4 of the Internet Protocol. IPv4 was created when the giant, world-wide Internet we take for granted today was just a small experimental network. Considering how much the Internet has grown and changed over the course of two decades, IPv4 has done its job admirably. At the same time, it has been apparent for many years that certain limitations in this venerable protocol would hold back the future growth of both Internet size and services if not addressed. Continue reading “An overview of the new Internet Protocol-IPv6”