Nothing is free. When we opened our computers up to networks, we developed the need to secure our transmissions. When we started carrying phones and laptops, we developed the need to secure our devices from unauthorized access.
Loosely speaking, security always costs us convenience. Encryption takes up processing time and resources at the sender and
What is the cloud? I imagine that if you ask a hundred people, you'll get a hundred different answers to the question. Believe it or not, the cloud isn't hard to understand.
The Cloud is Someone Else's Computer
Once upon a time, when computers were expensive and large machines that filled entire rooms, no one really
We've talked a lot about techniques for preventing common attacks on our data, but fairly little about the attacks themselves. If t weren't for attacks, of course we wouldn't even need encryption.
The first kind of attack leaves absolutely no trace, because the attacker isn't actually touching a target computer. In the passive attack,
If I were to ask you what the most common type of hack is, you'd probably guess something like SSL Injection, or Buffer Overflow, or something of that nature. You wouldn't be entirely wrong, but there's a much more general answer that covers all those things:
The most common attack is bad input
When it boils