Network Security – so https and ssh are immune to arp spoofing right?

Monday, January 30th, 2006

When a machine has been arp spoofed, ALL network traffic from it is likely passing through a “hostile” machine. So, NO, https and ssh traffic is not immune, it is travelling through a hostile machine. However, it should be encrypted. There are a few exceptions though. SSH version 1 is a broken encryption scheme and […]

Huge identity theft ring discovered by spyware research

Monday, August 8th, 2005

Sunbelt blog, reports that they have uncovered a MASSIVE amount of personal data, ranging from usernames to passwords to banking information and much more while investigating spyware. They found keylogger transcript software with lots of personal information. Sunbelt develops software to protect against spam and spyware and other security threats. A keylogger is software that […]

Google
 
Web www.averyjparker.com