Effective and ineffective Wi-Fi security
Which methods to secure a Wi-Fi network actually work, and which are just bumps on the road to an attacker gaining full access to your private network?
Emerging trends in application delivery
A look back at how application delivery has evolved, and how we can expect it to change in the coming years.
Proper password policies
A discussion of various password policies that are often enforced, their relative effectiveness and, in some cases, their harmfulness.
Email address obfuscation
A description of email obfuscation techniques in use today, and an evidence-based comparison of which ones work.
Unsung benefits of IPv6
Discussion of the advantages of IPv6, other than increased address space, such as mandatory encryption and extensibility.
Effective CPU denial of service attack using hash functions
A discussion of the exploit where, using hash collisions, a server can be DoSed using minimal bandwidth and resources.
Salt, pepper and rainbows: storing passwords properly
The proper methodology for storing passwords in a database. Covers hashing, rainbow tables, salting and peppering.