Security of Open Source Software

Is Open Source Software Really more Secure? The constant stream of Windows vulnerability attacks result not solely due to security holes in the Operating System, but also because of the ubiquity of Windows as both a client and server operating system makes it a prime target for any malicious intent. While open source zealots declare […]

Continue Reading

How to Create a Strong Password

The notion of passwords is not flawed, but rather it is the type of passwords that are commonly used that lead to password or security breaches. You need to have a complex and a strong password which needs to be changed on a regular basis in order to mitigate a successful password attack on your […]

Continue Reading

TIBCO Rendezvous RVD Daemon Remote Memory Leak DoS

The TIBCO Rendezvous RVD daemon is vulnerable to a memory leak, which when remotely triggered, prevents any further RV communication until the daemon is manually restarted. Vulnerability Type / Importance: Remote DoS / High Workaround: There are no known workarounds for this vulnerability The RV daemon (RVD) within TIBCO’s Rendezvous messaging product is responsible for […]

Continue Reading

IT Security Interviews Exposed

IT Security or Information Security has steadily grown from being an obscured field of work in some government or military or financial institutions to become a mainstream activity practiced by many professionals including myself. The growth of Internet and the challenges that come with securing the ever growing interconnected digital world along with the anonymity […]

Continue Reading

How to remove Tracking Cookies

Tracking Cookies while generally of a low threat level to your PC, they are still classified as Spyware. This article describes what a tracking cookie is, how to identify tracking cookies and finally how to remove tracking cookies. What is a tracking Cookie? Tracking cookies usually track the session of a user to a particular […]

Continue Reading