Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Security articles

Security attributes of a server management platform

Key questions when specifying a data centre automation platform.

Secure your wireless net with a shoestring

Encryption, authentication and plugging leaks.

Minimise the impact of RF jamming

Jump to another channel and call in the law!

Case Study: Maintaining fighter planes by Wi-Fi

Put the paper work on line - and don't make anything go boom

Keep your users secure on public-access Wi-Fi

Do VPNs and look for hotspots with multiple SSIDs.

Using TCP Wrappers to restrict connections

TCP Wrappers (formerly LOG_TCP) is one of the many security utilities written by Wietse Venema. Here we examine its security uses.

Securing dynamic web pages

This article highlights some of the security issues around the use of dynamic code environments, such as SSI, ASP and PHP.

Case Study: Security? What does Microsoft know about security?

A week in the life of an IT manager

Securing a web server

Web servers are sitting targets for malicious attack. Here is a basic guide to server protection.

Fine-tuning Samba for the enterprise (part 3 of 3)

Tune the Samba server to deliver maximum performance

How to ... correlate firewall alarms

Mixing and matching for added security

Securing routing protocols

This article can be read in combination with the previous How-to Securing router vulnerabilities

How to ... apply Windows security templates in the enterprise

A more flexible approach to network management.

Case Study: Lehman Bros runs its Wi-Fi over fibre!

Signal distribution keeps Wi-Fi kit under lock and key

How to cope with ARP attacks on LANs

IP uses something called ARP to map IP addresses to the physical addresses that underpin them. This can compromise security, of course.

Recovering passwords in Cisco IOS

IOS has a new password security feature. Users beware.

Can IPSec work over a voice network?

Some issues to consider when running IPSec security over a VoIP network.

IT techies should not write security policies

How to write a good security policy while avoiding the usual pitfall – nobody can understand a word of it.

Choosing a new firewall

Issues to weigh up before buying that most essential of modern security workhorses – the firewall.

The VPN won't save you

What are the risks of using VPNs and how can you tell if a user becomes compromised? Read up on prevention and cure.

Improving performance on a PC-based router/firewall

And maximise the life of some of your older hardware.

Adding multicast to IPSec

As multicast applications spread, a way of getting IPSec VPNs to work within this environment is useful. GRE tunnels are one way.

Safe Bluetoothing

It's a matter of being sensible

Building a no-cost Linux firewall

Always wondered how to make a low-cost firewall? Here's how.

Securing SMTP mail servers

Mail servers are a front line security risk. This article shows you how to minimise the risks.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map