Terry Zink: Security Talk

Discussing Internet security in (mostly) plain English

August, 2012

  • Terry Zink: Security Talk

    Designing my app with more anti-tampering in mind

    • 4 Comments
    As I have been writing on my blog before, I’m designing an app for the iPad and I am trying to design it with security in mind and then writing about it here. While a lot of my readers will already be well aware of these principles, many are not. ...
  • Terry Zink: Security Talk

    Article: Why passwords have never been weaker and crackers have never been stronger

    • 4 Comments
    The past few weeks, I’ve been on this security kick particularly when it comes to encryption. I’m developing my own app so I’m trying a whole bunch of things, no doubt making plenty of mistakes in the process. Luckily, the data I am...
  • Terry Zink: Security Talk

    How rainbow tables work

    • 3 Comments
    This year, I heard the term “rainbow tables” in regards to passwords and how hackers use them to break encrypted passwords.  I originally looked it up on Wikipedia but I couldn’t understand what I was reading (now that I know what they are, it makes...
  • Terry Zink: Security Talk

    The Backscatterer.org IP list

    • 2 Comments
    Office 365 (Exchange Online Protection, or EOP) frequently receives questions about the Backscatterer.org IP blocklist. Customers call in and say “Your outbound IPs for the service are on Backscatterer! What are you doing about it?” This often...
  • Terry Zink: Security Talk

    Designing my app with sanity checks in mind

    • 2 Comments
    As I’ve been writing before, I’m currently working on an iPad and I’ve got security in mind.  However, I’ve also got sanity checks in mind.  What do I mean by that? I’m not a huge, professional operation; instead, I am a one-man show (who has...
  • Terry Zink: Security Talk

    Designing my app with (anti) tampering in mind

    • 2 Comments
    As I continue on in my series about how I’m designing my app (because designing software is fun, and writing about it even more so), there’s still one more piece to the puzzle.  Even though I protect the data in transit from my web server to the...
  • Terry Zink: Security Talk

    Microsoft ends up #1 on SpamRankings.net for July

    • 1 Comments
    Last month, I stumbled upon SpamRankings.net and was surprised to discover that Microsoft was listed as the #1 spam source according to SpamRankings.net : Curious, I did some digging into the methodology.  Although the methodology currently says...
  • Terry Zink: Security Talk

    Hotmail to offer strong method for authentication

    • 0 Comments
    Recently, I read an article that says that Microsoft is going to use a better method than Gmail for authenticating into its webmail client, Outlook.com (formerly Hotmail).  If you read the article, Microsoft never actually says that their security...
  • Terry Zink: Security Talk

    An updated look at botnets

    • 0 Comments
    Today I looked up the most prolific botnets for the month of July.  Earlier this year the grum botnet was disrupted.  How have things changed since then?  Here’s a look at the top 15 botnets hitting our networks for the month of July by...
  • Terry Zink: Security Talk

    Is my friend is too overconfident in his ability to remain secure?

    • 0 Comments
    The other day, I had to change my Windows login password on my work computer.  As usual, whenever I ever change password, for the next 2-3 weeks, muscle memory kicks and I always type in my old password, hit Enter, get told I entered the wrong one...
  • Terry Zink: Security Talk

    Combating phishing

    • 0 Comments
    From time to time, customers call in and ask us what we are doing to combat phishing attacks. My guess is that they are really asking how we combat spoofing as most malware attacks delivered via email use spoofing (that is, they imitate someone they are...
  • Terry Zink: Security Talk

    Designing secure data transfer

    • 0 Comments
    As I have mentioned before on this blog, I’m currently designing an iPad app and I want to build it with security in mind.  Even though I don’t think I’ll be a hacking target (not enough money in it for them, and I suck at marketing), I still want...
Page 1 of 1 (12 items)