-
Effective and ineffective Wi-Fi security
Which methods to secure a Wi-Fi network actually work, and which are just bumps on the road to an attacker gaining full access to your private network?
-
Emerging trends in application delivery
A look back at how application delivery has evolved, and how we can expect it to change in the coming years.
-
Proper password policies
A discussion of various password policies that are often enforced, their relative effectiveness and, in some cases, their harmfulness.
-
Email address obfuscation
A description of email obfuscation techniques in use today, and an evidence-based comparison of which ones work.
-
Unsung benefits of IPv6
Discussion of the advantages of IPv6, other than increased address space, such as mandatory encryption and extensibility.
-
Effective CPU denial of service attack using hash functions
A discussion of the exploit where, using hash collisions, a server can be DoSed using minimal bandwidth and resources.
-
Salt, pepper and rainbows: storing passwords properly
The proper methodology for storing passwords in a database. Covers hashing, rainbow tables, salting and peppering.