Security
Safety Concerns That You And Your Tech Savvy Child Should Know About
Modern gadgets can also put your child at risk. This article discusses a few issues that you should know about.
Infographic: The Battle Against DDoS Attacks
DDoS attacks are always perpetrated by hackers using remote controlled botnets which are used to mount incessant, low-key attacks on targeted websites.
Programmers Needn’t Be Nervous That The Software They Create Can Be Reverse Engineered
IT has helped companies become more streamlined and increase productivity, but along with the pros of IT, a host of risks and uncertainties have emerged.
Penetration Testing
It has often been said that the best defense is a good offense and that is especially true when it comes to pen testing.
Another Identity Theft Risk – The Office Digital Copier
Nearly every digital copier built since 2002 contains a hard drive – like the one on your personal computer – storing an image of every document copied, scanned, or emailed by the machine.
All About the SSL Protocol
What is SSL? SSL stands for Secure Socket Layer (SSL). Originally developed by Netscape and now a de-facto standard for secure communication over the internet, SSL is implemented by all secure web servers and browsers like Internet Explorer, Firefox, Safari, Opera etc. Where SSL is used The widest use of the SSL protocol is done in […]
ClickJacking – Is This Link Safe?
Thursday, I attended a virtual security tradeshow, put on by InformationWeek and Dark Reading. Several hacker techniques were discussed by the various speakers. One that was new to me was called ClickJacking. It seems that you can go to a website and click on a link and nothing seems to happen. That has happened to me before. […]
Check Your System For Rootkits
WHAT ARE ROOTKITS? They’re nasty little tree-like creatures that hide and grow their roots in your computer and wreak havoc on it, that’s what they are! Actually, a rootkit was originally a Unix term, having to do with granting root access to a file or person. And even now a rootkit is not really a bad […]
Honeypots.net – Spam Fighter!
If you register with honeypots.net, they will help you set up “spam traps” on your site. These traps will help to catch various types of spammers – address harvesters, comment spammers, etc.
A Very Simple Lesson on Piracy vs. Theft
OK, ACCORDING TO THIS picture, I didn’t steal this pic – I pirated it. Too bad tech manuals aren’t this easy to understand, huh?