Author: 3-Hat Information Security

3-Hat Information Security > Articles posted by 3-Hat Information Security

Start with verifying your email. Email has become the primary means of communication for many businesses over the last few years. Email comes with a myriad of advantages from long term communication persistence, to being accessible from almost anywhere on earth. Email is one of the oldest standardized protocols for network communication that is still in use. This may explain why it...

Read More

Password Managers or better yet, PassPhrase Managers Password management has nearly become a requirement for the effective use of online services. With almost all online services requiring a distinct username and password for registration, there is often the temptation to reuse usernames and passwords. Luckily there are tools which can help you remember or even generate unique passwords to help you manage...

Read More

Network Isolation and the benefits of implementing a DMZ     Due to the interchangeability of terminology used in this article, the word "server" will be referring to the physical or virtual hardware and the operating system which is hosts. Whereas the word "service" will refer to any additional software which serves a dedicated role in the network.     At some point, every network engineer encounters a situation where they...

Read More

Testing and Patching: The Advantages and Risks of Both     Security vulnerabilities will eventually impact every publicly accessible system given enough time. It is unreasonable to expect over a thousand programmers to perfectly cooperate with each other and manage a code base of gigabytes of code written in different languages so perfectly that no vulnerabilities are ever created. Luckily, most software engineering firms are willing...

Read More