How To Prevent ARP Spoofing

“You can fool some of the people all of the time, and all of the people some of the time,

but you can not fool all of the people all of the time.”

-Abraham Lincoln

What is ARP spoofing, and why do I care? If you’re old enough, […]

How to Protect Yourself from Hacking Attacks

Hacking attacks happen all the time and pose a real security threat. Here are ten things you can do to protect yourself:

1) Don’t use the same password for all of your user accounts. Choose a variety of passwords, and make each one strong (no full words, use both numbers and letters). Keep your list […]

Security Sandboxes and Virtualization

The easiest way to take advantage of the new security sandbox technology is to upgrade your hardware and software. Not everyone can afford to do that. What other options are there if you want a security sandbox? Sandboxing is closely related to virtualization. Virtual computing is a good way to get some of the benefits […]

Targeted Advertising

Ever been interested in a certain product, and done some Google research about it? Then, for days afterwards, whenever you go to a website, you see ads for that very same thing? What a coincidence! Well, actually, it is not a coincidence. It is called Targeted Advertising. Whenever you browse to a certain site, the […]

A GREAT Book on Security

A while ago, there was something called the Trusted Computing initiative. Here is its marketing message. Sounds great, right? I think the truth is probably closer to these Trusted Computing FAQs. Just to make matters more confusing, there is also a Trustworthy Computing initiative. According to Wikipedia, “More recently, Microsoft has adopted the term Trustworthy […]

How to Opt Out of Junk Mail

Data Marketers have lots of data about you. Acxiom’s latest ploy is for them to show you what data they already have on you. I checked at https://aboutthedata.com/portal. It really wasn’t that interesting, and much of it was wrong. The Acxiom website allows you to correct the information that is wrong. You can do that, […]

Be Suspicious of Online Software Delivery

If you download software from the Internet, it is possible that the downloads have been tampered with by someone malicious. Very unlikely, but it is possible. Every once in a while, I hear a news report about some site being hacked, and the software on the site is now suspected of being tampered with.

Well, […]

Potential Logging of E-Business Suite Passwords

Late last year in my work for Jibe Consulting, I detected a password disclosure issue with E-Business Suite R12, and reported it to Oracle. After I made sure that Oracle Support could replicate the issue, Oracle E-Business Suite Development worked the issue. The password disclosure issue has now been addressed in the July 2013 CPU […]