SSLv3 / TLS Man in the Middle vulnerability
Recently I have been looking into the vulnerabilities in the TLS negotiation process discovered late…
Ham Radio Iphone applications
I have a Iphone and have been loading Ham applications onto it… Below is a…
SCADA considerations
Procedures Corporate Information Protection Security Management Information Classification Physical (and Environmental) Security Personnel Security Security…
How To Hijack Fast Food Drive-Thru Frequencies
This is an article I found on the Phone Losers site I thought I would…
VoIP and SIP links
I’m looking at the Microsoft OCS server and other SIP integration environments. So I thought…
Secure Application Development links
Hi, I have been putting some secure application development documents together recently and have found…
Internet Banking Security Assessment Considerations
I was asked some time ago to provide a list of things which may be…