Security Port

Security Forums
Security Articles
Security Port Blog
Security Blogs
Security Books
Security Glossary
Security Definitions
Security Directories
Security Wikis
Security Tradeshows
Security Newsletters
Security Alerts
Buyers Guides
Security Newsgroups
Security Organizations
Submit Security Sites
Security Magazines
Security Feeds
Security News
Security Software
Security Products
Search Databases


Security Port
Contains relevant information that pertains to security related issues and solutions.

Security Port

A Security Port Blog
College Spammers Prosecuted
05/01/2009

Two brothers from Missouri and two of their cohorts have been charged with conspiracy and violations of the CAN-SPAM Act thanks to their $4 million e-mail scheme targeting university and college students across the US. The scheme originated out of the University of Missouri, but the group took numerous measures to obscure the origins of their e-mails.

Send Network Alerts
05/03/2009

Send network alerts to pagers and cell phones immediately.

What is Software Piracy
05/02/2009

Software piracy refers to the unauthorized duplication and use of computer software. Software developers work hard to develop solid software programs. If those applications are pirated and stolen, the software developers will often be unable to generate the revenue required to continue supporting and expanding those applications. The effects of software piracy impact the entire global economy. The reduced revenues often divert funding from product development, and result in less research and less investment in marketing. In 2007, economists indicated that software piracy cost the industry $39.6 billion.

What Is Software Piracy?

Software Industry Conference
05/01/2009

The Software Industry Conference is scheduled for July 16-18th, 2009 in Boston MA. Sign-Up now.

Chilling Truths about Internet Drugs
04/30/2009

Headache pills made of rat poison and Viagra made of chalk, the truth about internet drugs. They cause hundreds of thousands of deaths per year.

Security Logos
04/30/2009

Large collection of security logos.

Fighting Cyber Terrorism
04/29/2009

The Pentagon is completing plans for a new military command that would coordinate the security of the nations computer networks. It would also develop new offensive cyber-weapons, U.S. officials said.

It comes as hackers, criminals and spies have increased attacks on the countrys utility grids, stock markets, airline systems, military networks and other government computer systems that contain sensitive information.





Current Blog

2009 Securty Blog Archive
April Archive
March Archive
February Archive
January Archive

2008 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
July-August Archive
May-June Archive
April Archive
March Archive
February Archive
January Archive

2007 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive

2006 Security Blog Archive
December Archive
November Archive
October Archive
September Archive
August Archive
July Archive
June Archive
May Archive
April Archive
March Archive
February Archive
January Archive


Security Alerts
Locate security alerts, and security feeds via a security rss feed directory.