Sign in / up
The Register® — Biting the hand that feeds IT

Topics

Security

Security

All SecurityCyber-crimePatchesResearchCSO
Off-Prem

Off-Prem

All Off-PremEdge + IoTChannelPaaS + IaaSSaaS
On-Prem

On-Prem

All On-PremSystemsStorageNetworksHPCPersonal Tech
Software

Software

All SoftwareAI + MLApplicationsDatabasesDevOpsOSesVirtualization
Offbeat

Offbeat

All OffbeatDebatesColumnistsScienceGeek's GuideBOFHLegalBootnotesSite NewsAbout Us
Special Features

Special Features

Spotlight on Databases

Vendor Voice

Vendor Voice

Vendor Voice

All Vendor VoiceAmazon Web Services (AWS) Business TransformationDDNElasticGoogle Cloud for Startups
Resources

Resources

Whitepapers Webinars Newsletters

Scott Granneman

Security analogies: the key to educating laymen

Comment Explaining tech concepts to the masses
Security31 May 2007 | 2

The Fear biz is the computer security biz

Comment Lies, damn lies...
OSes11 Feb 2007 |

Security, privacy and DRM: My wishes for 2007

Scott Granneman sets out his stall
Channel13 Jan 2007 |

A hard lesson in privacy

Comment The importance of keeping personal matters personal
Security28 Nov 2006 |

Surprises inside Microsoft Vista's EULA

Analysis Not a thing of beauty
Channel29 Oct 2006 |

LinuxWorld, virtually speaking

The future's in virtualisation
Channel19 Aug 2006 |

CafePress for wall art?

Review ImageKind beta hits the web
Bootnotes01 Aug 2006 |

Moore's the modern Weegee

'Credit hole by HD Moore the famous'
Security26 Jul 2006 |

WiMAX in the UK. Here's why it won't fly

Comment Spectrum is rare
Networks03 Jul 2006 |

MySpace, a place without MyParents

Comment Parental supervision - the real issue
Legal03 Jul 2006 |

Why phishing catches punters

Comment Hook, line and sinker
Security07 Jun 2006 |

Innovative ways to fool people

Comment 'Your data or your life'
Channel05 May 2006 |

Virtualization for security

Vista of fluffy white clouds
Channel13 Apr 2006 |

As Emperor of Security, I hereby decree...

Comment Benovolence is my middle name
Security28 Mar 2006 |

The big DRM mistake

Comment It just doesn't make sense...
Legal03 Mar 2006 |

Wi-Fi for dummies

Securing network access while on the run
Channel10 Feb 2006 |

Users inundated with pop-ups

Configure me out
Channel13 Dec 2005 |

Sony fiasco: More questions than answers

Rootkit rumpus rumbles on
Channel23 Nov 2005 |

Beware eBay bearing Skype

Comment Ominous security omens
Channel23 Sep 2005 |

On blocking Chinese IP addresses

Comment The Great Firewall of China
Channel31 Aug 2005 |

Greasemonkey wobbles but it doesn't fall down

Analysis Security issues, yes, but...
Security09 Aug 2005 |

Microsoft and Claria: together at last?

Comment The sound of spleen venting
Security15 Jul 2005 |

Your fingerprints are everywhere

Comment The library, Disneyland, Lady Liberty...
Channel16 Jun 2005 |

Live CD paradise

Important security tools
Channel07 May 2005 |

Privacy from the trenches

How the public are inured to data breaches
Channel20 Apr 2005 |

How shall I own your mobile phone today?

Comment Bluesnarfing, bluejacking, bluebugging
Security25 Mar 2005 |

Google AutoLink: enemy of the people?

Don't be evil ... mostly
Security03 Mar 2005 |

Beware the unexpected attack vector

Threats from all sides
Security10 Feb 2005 |

Exploring the law of unintended consequences

Column DRM and asbestos curtains meet the Shah of Iran
Security21 Jan 2005 |

Trojan Horse Christmas

Column That shiny new Windows PC
Security31 Dec 2004 |

Online extortion works

Opinion Pay up, or your server gets it
Security14 Dec 2004 |

Stunned pundit agrees with Gates over passwords

Biometrics and smartcards are the future
Security22 Nov 2004 |

Phishing for dummies: hook, line and sinker

Too tech-savvy to get caught? Think again
Security02 Nov 2004 |

Fighting the army of byte-eating zombies

Internet Security Threat Report
Security08 Oct 2004 |

Academia battles forces of IT anarchy

Unending security headaches
Security16 Sep 2004 |

Infected in 20 minutes

Opinion Stepping in and taking charge
Personal Tech19 Aug 2004 |

The battle for email privacy

You've got company
Security30 Jul 2004 |

Would you trade your password for chocolate?

If yes, click here sharpish
Security28 May 2004 |

Working up an appetite for destruction

Data disposal without tears
Storage15 Apr 2004 |

Security patches via modem? Forget it!

Opinion 11.3MB at 56kbps - you work it out
Security26 Mar 2004 |

The perils of Googling

A tool for good and evil
Security10 Mar 2004 |

A visit from the FBI

We come in Peace
Security28 Jan 2004 |

Electronic Voting Debacle

Opinion American democracy at stake, no less
Security18 Nov 2003 |

Joe Average User Is In Trouble

Opinion Where's my security blanket?
Security27 Oct 2003 |

Linux vs. Windows Viruses

Opinion Let's go to work
Security06 Oct 2003 |

RFID Chips Are Here

Your privacy is at stake
Security27 Jun 2003 |

The Register icon Biting the hand that feeds IT

About Us

  • Contact us
  • Advertise with us
  • Who we are

Our Websites

  • The Next Platform
  • DevClass
  • Blocks and Files

Your Privacy

  • Cookies Policy
  • Privacy Policy
  • T's & C's
  • Do not sell my personal information
Situation Publishing

Copyright. All rights reserved © 1998–2023