Guess what? Data that would normally be blocked by a firewall can typically be tunneled through HTTP(S)--and reach its destination with no trouble at all.
Articles by Kurt Seifried
Security is never black and white - rather it's one big ugly shade of gray. Learn why perfect security is not necessary, or even desirable.
Most take an all-or-nothing approach to firewall setup. Here are some tips to help you configure your firewall to align with your actual needs.
Hiring hackers to test your security seems like a good idea--but what exactly is their security expertise, and what are the risks associated with allow them access to your systems?
Do you think your Linux system is less vulnerable to viruses? Read this overview from SecurityPortal and find out what your risks really are.
Kurt Seifried has read pretty much every single vendor-issued security advisory, along with advisories for software packages on Bugtraq and other mailing lists, Web sites, etc. Here's his take on the status of the security advisory.
Many machines and devices on your LAN might still have their default passwords enabled--a decidedly high risk intrusion opportunity. What can you do about it?