Security

Child with Tablet

Safety Concerns That You And Your Tech Savvy Child Should Know About

Modern gadgets can also put your child at risk. This article discusses a few issues that you should know about.

Continue Reading
Infographic: The Battle Against DDoS Attacks

Infographic: The Battle Against DDoS Attacks

DDoS attacks are always perpetrated by hackers using remote controlled botnets which are used to mount incessant, low-key attacks on targeted websites.

Continue Reading
Software Obfuscation

Programmers Needn’t Be Nervous That The Software They Create Can Be Reverse Engineered

IT has helped companies become more streamlined and increase productivity, but along with the pros of IT, a host of risks and uncertainties have emerged.

Continue Reading
Penetration Testing

Penetration Testing

It has often been said that the best defense is a good offense and that is especially true when it comes to pen testing.

Continue Reading
The Office Copy Machine

Another Identity Theft Risk – The Office Digital Copier

Nearly every digital copier built since 2002 contains a hard drive – like the one on your personal computer – storing an image of every document copied, scanned, or emailed by the machine.

Continue Reading
HTTPS

All About the SSL Protocol

What is SSL? SSL stands for Secure Socket Layer (SSL). Originally developed by Netscape and now a de-facto standard for secure communication over the internet, SSL is implemented by all secure web servers and browsers like Internet Explorer, Firefox, Safari, Opera etc. Where SSL is used The widest use of the SSL protocol is done in […]

Continue Reading
Click Jacking

ClickJacking – Is This Link Safe?

Thursday, I attended a virtual security tradeshow, put on by InformationWeek and Dark Reading. Several hacker techniques were discussed by the various speakers. One that was new to me was called ClickJacking. It seems that you can go to a website and click on a link and nothing seems to happen. That has happened to me before. […]

Continue Reading
Rootkits

Check Your System For Rootkits

WHAT ARE ROOTKITS? They’re nasty little tree-like creatures that hide and grow their roots in your computer and wreak havoc on it, that’s what they are! Actually, a rootkit was originally a Unix term, having to do with granting root access to a file or person. And even now a rootkit is not really a bad […]

Continue Reading
HoneyPot

Honeypots.net – Spam Fighter!

If you register with honeypots.net, they will help you set up “spam traps” on your site. These traps will help to catch various types of spammers – address harvesters, comment spammers, etc.

Continue Reading
Piracy vs Theft

A Very Simple Lesson on Piracy vs. Theft

OK, ACCORDING TO THIS picture, I didn’t steal this pic – I pirated it. Too bad tech manuals aren’t this easy to understand, huh?

Continue Reading