Authentication Without Encryption for Ham Radio

Crypto can be used for secure authentication without obscuring the meaning of communications - by KI4AWF.

Tired of Contact Form Spam?

The SIC-2007 Call for Papers is Hot off the Press

Happy Copyright Notice Update Day!

Georgia Tech to Compete in Network Security Contest

The new City of John's Creek

A.R.M. Yourself Against SQL Injection

Proactively validate all input strings. Use ARM - Accept it, Reject it, or Modify it.

A.R.M. Yourself Against SQL Injection

Proactively validate all input strings. Use ARM - Accept it, Reject it, or Modify it.

Saying no to PayPal Phishing Attacks

Part I: Introduction to SQL Injection