Articles by Kurt Seifried 

Backdoors, Back Channels and HTTP(S)

Guess what? Data that would normally be blocked by a firewall can typically be tunneled through HTTP(S)--and reach its destination with no trouble at all.

Why We Don't Need Perfectly Secure Systems

Security is never black and white - rather it's one big ugly shade of gray. Learn why perfect security is not necessary, or even desirable.

Firewalls: What To Block

Most take an all-or-nothing approach to firewall setup. Here are some tips to help you configure your firewall to align with your actual needs.

Hiring Hackers: Why it Might Not Be Such a Good Idea

Hiring hackers to test your security seems like a good idea--but what exactly is their security expertise, and what are the risks associated with allow them access to your systems?

Linux Viruses: Overview

Do you think your Linux system is less vulnerable to viruses? Read this overview from SecurityPortal and find out what your risks really are.

Writing Security Advisories: The Good, the Bad and the Ugly

Kurt Seifried has read pretty much every single vendor-issued security advisory, along with advisories for software packages on Bugtraq and other mailing lists, Web sites, etc. Here's his take on the status of the security advisory.

Default Passwords and What You Can Do About Them

Many machines and devices on your LAN might still have their default passwords enabled--a decidedly high risk intrusion opportunity. What can you do about it?

Get the Latest Scoop with Networking Update Newsletter