Software crackers who make money breaking other people’s software don’t usually get rich from their skills. With the release of iDefense Labs report on Emerging Economic Models for Vulnerability Research, this may be changing.
Archive for May, 2010
When recommending penetration testing for a corporate network the first question is usually, ”Why would we need penetration testing?” The first answer is, if you don’t they will. Everyday malicious and sometimes just overly curious people use their computers to run automated testing scripts that look for system vulnerabilities to record and potentially later exploit. Sometimes the [...]
The fact that Sony will stop selling floppy disks in Japan has generated a lot of headlines recently, and it’s easy to realize after seeing them that storage solutions have become quite cheap. They’ve become more complicated, too, however, and so a guide titled “Hot To Get The Most Out Of Your NAS” may prove [...]