The History of Hacking

Discovery Channel played a very interesting documentary titled “The History of Hacking”. This goes into the whole history of hacking starting with phone phreaking and Blue boxes and to the present state of hacking. However, a significant portion of this documentary tackles Social Engineering especially the most famous or rather infamous social engineer of all, […]

Continue Reading

Unix Shell for Windows

A lot of us who use Linux at work/school or have always grown up using Unix commands and using the Unix shell for years and more often than not, there are instances where a ls command comes more naturally than the dir command at the command prompt when using Windows. For the most part, a […]

Continue Reading

Important Computer Security Terms and Terminology

This article lists some Computer Security Terms and Computer Security Terminology. For anyone reading any of the computer security terms below for the first time, I highly recommend that you Google these keywords and learn more about them. Adware: The difference between Adware and Spyware is very subtle. Both Adware and Spyware is installed without […]

Continue Reading

Security of Open Source Software

Is Open Source Software Really more Secure? The constant stream of Windows vulnerability attacks result not solely due to security holes in the Operating System, but also because of the ubiquity of Windows as both a client and server operating system makes it a prime target for any malicious intent. While open source zealots declare […]

Continue Reading