Authentication Without Encryption for Ham Radio

Crypto can be used for secure authentication without obscuring the meaning of communications - by KI4AWF.

Tired of Contact Form Spam?

The SIC-2007 Call for Papers is Hot off the Press

Happy Copyright Notice Update Day!

Georgia Tech to Compete in Network Security Contest

The new City of John's Creek

A.R.M. Yourself Against SQL Injection

Proactively validate all input strings. Use ARM - Accept it, Reject it, or Modify it.

Saying no to PayPal Phishing Attacks

Part I: Introduction to SQL Injection

Web Application Security & Performance

Timeless tips for improving security & performance for critical web applications.