hakin 2/2008

The Justification for Authentication and Encryption

You will need to understand how to configure and compile Postgres from source code as many of the solutions requires that your Postgres server has the necessary libraries and capabilities installed that the typical Linux Distro may be lacking. Author: Robert…

One Time Password – New Dimensions in Security

There has been a sharp increase in e-commerce and online banking transactions in recent times. Remote access to the office network has resulted in ease and convenience of work. Due to this, there is increase in online network access usage….

CounterSpy v.2 from Sunbelt

Security is not a static wall to guard our selves from the other side. It is a continuous process of shielding, guarding and improvising the various areas of weaknesses and possible compromise. Unlike the olden days where the castles are…