Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message



Latest Security articles

Authenticate wireless users

How much authentication is good enough?

A guide to controlling your airspace

Don't fight it, work with it.

Block abusive users on your WLAN

Get tough with MAC address filtering and disassociation

Case Study: Hack... hack back... repeat

How a game at DefCon pitted hackers against each other.

How to stop firewalls advertising their secrets

Even a secured down firewall tells the world a lot about you. Here’s how to stop people finding out your secrets from your firewall.

Case Study: Lehman Bros runs its Wi-Fi over fibre!

Signal distribution keeps Wi-Fi kit under lock and key

How to cope with ARP attacks on LANs

IP uses something called ARP to map IP addresses to the physical addresses that underpin them. This can compromise security, of course.

Recovering passwords in Cisco IOS

IOS has a new password security feature. Users beware.

Can IPSec work over a voice network?

Some issues to consider when running IPSec security over a VoIP network.

IT techies should not write security policies

How to write a good security policy while avoiding the usual pitfall – nobody can understand a word of it.

Securing dynamic web pages

This article highlights some of the security issues around the use of dynamic code environments, such as SSI, ASP and PHP.

Case Study: Security? What does Microsoft know about security?

A week in the life of an IT manager

Securing a web server

Web servers are sitting targets for malicious attack. Here is a basic guide to server protection.

Protecting Linux servers

How to track down the right Linux firewall for your circumstances

Strategies for automatic patch management

If the onslaught of Trojan horses, worms and viruses has taught us anything, it's that software patches are as vital to network security as virus updates.

Five tips for controlling access to your network

There's more to network security than a single perimeter.

Offer public access without creating a security risk

Are multiple SSIDs a great idea, or too cumbersome?

Security attributes of a server management platform

Key questions when specifying a data centre automation platform.

Secure your wireless net with a shoestring

Encryption, authentication and plugging leaks.

Minimise the impact of RF jamming

Jump to another channel and call in the law!

Case Study: Maintaining fighter planes by Wi-Fi

Put the paper work on line - and don't make anything go boom

Keep your users secure on public-access Wi-Fi

Do VPNs and look for hotspots with multiple SSIDs.

Choosing a new firewall

Issues to weigh up before buying that most essential of modern security workhorses – the firewall.

The VPN won't save you

What are the risks of using VPNs and how can you tell if a user becomes compromised? Read up on prevention and cure.

Improving performance on a PC-based router/firewall

And maximise the life of some of your older hardware.

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map