Please note we occasionally append these releases with new information,
some mature content and respective links may become extinct.
Articles of Interest
Privacy and Security on your PC, IEEE 1394 vs. USB 2.0, Distributed vs. Grid
Computing, Seven Deadly Sins of CRM, Optical Ethernet, Should You Develop
Your Own Software, The Dirty Dozen: 12 Security Lapses, Protocol Overview:
SMTP - POP - IMAP, IPSec Overview, The Viral Mind - Motives of Malicious
How safe is sensitive magnetic data once itís been deleted?
CDT Standards Bulletin 1.01 MAY 30, 2002
ieprep Red Light Emergency Internet Packets.
From enterprise to small business solutions, blind faith in brand-name
consultants may not mitigate project risk. Seek second opinions and involve
third-party consultants in your technology projects.
IETF draft Responsible Disclosure Process - top 10 security headaches - top
10 backup pains - computer forensics summary.
The Good, The Bad, and The Hidden...of rootkits
Security holes are not new to the industry