 | Windows Encrypted Filesystem: We examine the operation, features, applications, and security of Windows' new "Encrypted Filesystem" feature. |
 | The HOSTS file: The network HOSTS file is the first place our systems look for the IP address of local or remote machines. By putting "dummy" entries into the HOSTS file our computers can be kept from accessing malicious sites and services. |
 | The Security of BitTorrent (and other peer-to-peer systems): Bittorrent has become a popular "post-Napster" solution for obtaining large files by "peering" with other Bittorrent users who have already obtained all or part of the desired file. What are the security implications of using Bittorrent and similar peer-to-peer tools? |
 | Zombie Fleets: Right this minute, hundreds of thousands of PCs worldwide are being remotely controlled by malicious hackers. These "Zombie" computers are silently obeying the will of their hidden masters, each who control fleets of thousands of machines. This trend has grown and evolved a lot since my own encounter with this several years ago. Leo and I will look at the phenomenon of Zombie PCs and talk about the consequences to you. |
 | Personal File Encryption: What solutions and alternatives are available for truly unbreakable local file encryption for personal PCs? |
 | IPv6 - the next standard: All of our computers, routers, ISP's and the most of the Internet are currently using "Version 4" of the Internet Protocol (IP), known as IPv4. IPv6 is slowing gaining traction. What new features and solutions does it offer? |
 | Your privacy and your ISP: What privacy exposures would you face if your ISP or one of their employees were not totally trustworthy? What are the privacy and security implications of the fact that all of your bandwidth runs through your ISP's network? And for that matter, what are the privacy and security implications anytime your network traffic is exposed to anyone outside of your control? |
 | Identity Theft: What it is, how it happens, what it means, and what you can do to keep it from happening to you. |
 | Exploiting Remote Vulnerabilities: What exactly are buffer overflows? How do "open ports" create dangers and opportunities for hackers? How are hackers (and worms!) able to exploit bugs in code to remotely take over a someone's computer on the Internet? |
 | The Security of eCommerce: How secure are "secure" connections to other web servers? When an "https:" URL is being used, is that really secure? What are the types of risks you face when shopping online with your credit card? |
 | Free Security: What are the current "best of breed" free security tools personal firewall, anti-virus, anti-spyware and why. |
 | Windows "Vista" Security: Our security analysis of the next major step for Microsoft's consumer Windows operating system: Windows Vista. |
 | Misfortune cookies: Why you never want to accept a cookie from a stranger. How simple web browsing leaks personal information to unknown third-parties and how to prevent it. |
 | Peer-friendly NAT routers: Not all NAT routers are equally "peer-to-peer friendly". Good NAT routers allow direct endpoint-to-endpoint interconnection, while bad NAT routers force a third-party to relay the information. How to determine which type you have, and how to choose the best one for peer-to-peer connections. |
 | GRC's free LANSlide utility (not yet released to the public): What LANSlide can tell you about the operation of your own network, the strength of your NAT router, the processing load from your personal firewall, and the true speed of your wireless LAN. |