TrueCrypt — Free Open-Source Disk Encryption Software Homepage : http://www.truecrypt.org Free open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux Main Features: * Creates a virtual encrypted disk within a file and mounts it as a real disk. * Encrypts an entire partition or storage device such as USB flash drive or […]
Category Archives: Security
What is Social Engineering? Social engineering is the method by which an attacker will gain information about a person or system by manipulating people within the organization. Using this method to gain access to a network does not always involve complex computer hacking techniques. A phone can be a hacker’s best friend. Many times an […]
Bypassing Firewalls Using SSH Tunneling : Most networks are monitored and protected by firewalls. These devices are the first line of defense for most networks and are used to “plug” security holes that could adversly affect the network and its users. In many cases they also prevent its users from participating in actions that are […]