Post

Phishing and Pharming

Phishing and Pharming to Get your Information When using the Internet, unless you are very inquisitive, skilled and have a lot of time you know nothing about the site other than the name displayed by the site. Scammers work very hard to mask themselves from you with websites that appear legitimate. In fact, the setting...

On June 8, 2010June 8, 2010by
Post

Web Security Appliance With Apache

As more and more attacks are being carried out over the HTTP layer there is a growing need to push the envelope and bring Web security to new levels. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. The need for increased security has...

On June 8, 2010June 8, 2010by
Post

Secure Web Based Mail Services

There used to be a time when secure email management was simple. “Managing” meant sorting through your email messages, putting them into appropriate folders. Secure email back them meant using a simple password for email access. However, today, with email being a business critical application, more threats against email than ever before, government regulatory concerns,...

On June 8, 2010June 8, 2010by