Passwords provide the first line of defence in computer systems and must be considered one of the top elements to protect and secure. They offer the main access control mechanism in computers and with some good security practices can provide a big obstacle to intruders. Following are some best security practices for using on your […]
[Continue reading]Use always two antispyware – Best Free antispyware software
From my experience, the use of just one antispyware software to protect your home computer is never enough. Sometimes, antivirus suites include also an antispyware engine but I prefer to use my antivirus software for virus protection only and have dedicated antispyware tools specifically for their intended purpose. Especially since you can find excellent antispyware […]
[Continue reading]Bring your Home TV to your PC – Watch TV on PC
Continuing our series of posts with the Home Network technologies, in this post I will present another application of a wired or wireless home network: Watching and managing your TV programs from your computer. The PCTV to Go device from Pinnacle can make this possible. Lets start with a diagram to make things clear. The […]
[Continue reading]CISSP Code of Ethics Canons
The following Canons are shown in the priority that they should be followed. To become a CISSP you must adhere to Ethical actions. Before taking the CISSP exam you must sign and agree to the code of ethics of the (ISC)2 organization. (ISC)2 CODE OF ETHICS CANONS Do no harm. Protect society, the commonwealth, and […]
[Continue reading]Security Policy
Security Policies in an organization’s security system are divided into two broad categories: 1. Management’s Security Policy (or Organizational Policy) This is the high level security policy of the whole organization. It provides management’s security goals and objectives in writing. It documents compliance and creates a security culture within the company. It establishes also the security […]
[Continue reading]Quantitative Risk Analysis
In Quantitative Risk Analysis, we try to translate every information asset element into monetary value. There are three steps in Quantitative Risk Analysis: Determine Single Loss Expectancy (SLE): Single Loss Expectancy is a measure of the money loss that an information asset will suffer due to the activation of a threat. SLE = Asset Value ($) […]
[Continue reading]Virus Types
Viruses are generally distinguished by the way they spread and propagate or the target they attack. The following virus types do not necessarily indicate a strict division. A file infector for example may also be a system infector. A script virus that infects other script files may be considered also to be a file inspector. […]
[Continue reading]Cisco ASA Firewall – Web Administration and Web VPN
Cisco ASA Firewalls (ASA 5500 series) offer several ways for remote administration and management of the devices such as SSH access, Telnet access, and Web HTTP access. The last one (HTTP access) makes use of the ASDM (Adaptive Security Device Manager) which is a powerful graphical application for administration and management of the firewall device. […]
[Continue reading]Internet Access Statistics for June 2008 in Europe
I stumbled upon an interesting statistics report by Eurobarometer survey showing the Internet access penetration in European countries between November and December 2007. It shows that Europe is becoming more computerised and Internet access and penetration is increasing among households across the European Union. Some of the statistics are shown below:
[Continue reading]IPv6 Addresses Explained
A recent study by RIPE (the European Internet Registry for IP addresses) has warned that by 2011 the current version of IP addresses (IPv4) will be depleted, thus it urged all professional bodies and organizations dealing with the Internet to actively adopt and support the new IPv6 address version. IPv6 addresses are 128 bits long-much […]
[Continue reading]- « Previous Page
- 1
- …
- 9
- 10
- 11
- 12
- 13
- …
- 19
- Next Page »