Suppose, for the sake of argument, that you wanted to spy on people using Microsoft’s outlook.com website. First, you would need to capture requests to the site along with the returned web pages. But ...
Continuing the theme from my previous column on the relative security of Internet Information Service (IIS) vs. Apache, I’ve come across more studies to support my initial conclusion. Since a single ...
(1) A server on the Web that supports a security protocol, which is typically SSL. Order forms with credit card numbers and other sensitive data transmitted to and from a Web server must be encrypted ...
This alternative to Internet Information Services, which Microsoft uses for its own services, delivers modern dynamic web applications on common server platforms or in containers. Microsoft’s Internet ...
Fifteen years ago, you weren’t a participant in the digital age unless you had your own homepage. Even in the late 1990s, services abounded to make personal pages easy to build and deploy—the most ...
Last month, I began a series of articles on Squid Web proxy security by introducing the theory, benefits and architecture of Web proxies. This month, we dive right in to basic Squid installation, ...
If you work on the go fairly often, you’ve probably hopped on a public wireless network at least once or twice. You should have also figured out how to keep your data safe when you’re on such a ...
Every Raspberry Pi owner knows the diminutive device can do nearly anything tech-wise. From replacing your slow PC to improving your hangout space with mood lighting and more, a Raspberry Pi is a wise ...
In my previous three columns [April, May and July 2009], I described the concept, benefits and architectural considerations of outbound Web proxies (Part I); discussed basic Squid installation, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results
Feedback