Email communication has become so common, users often forget that there is no inherent security in the common implementation. For general correspondence it might be acceptable to forsake security in the interest of ease of use. After all, the sharing of recipes between old friends is not always a matter …
Email and Encryption
Posted on in Information Systems

As you may know,
Oops! I guess I'm way behind the times.
If you are at all familiar with
This isn't late breaking information, but there's an interesting post in the
On most networks, there is a subset of IP addresses assigned to "management" hosts. These hosts might be the workstations of network administrators or monitoring servers. One of the keys to network security is restricting who has access to the device. Generally, we think of access restriction in terms of …