Everyone knows that it is important to lock down the resources on the network. The resources that need to be locked down include folders and the files that are contained in them, as well as some Registry keys that are located on servers and workstations throughout the enterprise. We can’t forget those Active Directory objects that reside on domain controllers. …
Read More »Security
How Do You Know Your Data Encryption is Really Secure
There are various types and methods of data encryption. Some of the most popular forms of data encryption include single file encryption, folder encryption, volume encryption, whole disk encryption, and of course email encryption. The Windows XP operating system has the ability to perform file and folder encryption. There are 3rd party tools, like PGP Desktop, which can perform whole …
Read More »Understanding E-mail Spoofing
Spam and e-mail-laden viruses can take a lot of the fun and utility out of electronic communications, but at least you can trust e-mail that comes from people you know – except when you can’t. A favorite technique of spammers and other “bad guys†is to “spoof†their return e-mail addresses, making it look as if the mail came from …
Read More »Packet fragmentation VS Intrusion Detection System (IDS)
Intrusion Detection Systems (IDS) have long had a problem with packet fragmentation. This was true five years ago and it is still a problem today. For years the IDS has suffered from several key ailments. Chief amongst them is in how they deal with packet fragmentation. There has been great progress made over the years in how an IDS will …
Read More »What You Need to Know About Intrusion Detection Systems
Firewalls and other simple boundary devices lack some degree of intelligence when it comes to observing, recognizing, and identifying attack signatures that may be present in the traffic they monitor and the log files they collect. Without sounding critical of such other systems’ capabilities, this deficiency explains why intrusion detection systems are becoming increasingly important in helping to maintain proper …
Read More »The Long-Term Impact of User Account Control
The problem with running as an administrator is obvious: any malware that attacks users, or the applications they run, will have full control over 90 percent of the computers it infects. The User Account Control (UAC) feature in Windows Vista is the Microsoft solution to a pervasive security challenge—the fact that over 90 percent of users currently on the Windows …
Read More »Fundamental Computer Investigation Guide For Windows
Internet connectivity and technological advances expose computers and computer networks to criminal activities such as unauthorized intrusion, financial fraud, and identity and intellectual property theft. Computers can be used to launch attacks against computer networks and destroy data. E-mail can be used to harass people, transmit sexually explicit images, and conduct other malicious activities. Such activities expose organizations to ethical, …
Read More »7 tips computer security for students
These tips can help protect the computers you use for school from viruses, hackers, spyware, and other attacks. 1. Perform basic computer safety maintenance Before you surf the Web, you should perform three key maintenance steps to help improve the computer’s security. Visit Protect your computer in 4 steps and follow the steps online to: Use an Internet firewall. Update …
Read More »Securing Data in Hosted Applications
Trust, or the lack thereof, is a key factor with respect to the adoption of the Hosted Application and the Software as a Service (SaaS) model. The case could be made that data is the most important asset of any business application—data about products, customers, employees, suppliers, and more. In a hosted model, an organization must surrender a level of …
Read More »
SON SON