Networking Reviews

An overview of Web Applications and Web Servers security

Leave a Comment

Did you know that the vast majority of internet attacks nowadays are focused on web applications and web servers in general? Almost any business has an online presence with a website, e-commerce web application, web front with database at the back etc etc. Hackers have found ways to infiltrate internal networks via those web applications […]

[Continue reading]

Filed Under: Information Security, Network Security Tagged With: database security, web server security, website security

Protect your children on the Internet

Leave a Comment

Many parents ask how they can protect their children while they surf on the Internet. Recently a mother was worried that her children spend too much time on sites like Orkut, MySpace and Facebook. These concerns were not because of time loss from such activities but mainly because she didn’t know with whom the children […]

[Continue reading]

Filed Under: Home Computer Security, Information Security, Network Security Tagged With: internet child protection, protect your children on internet

How to Remove the Conficker – Downadup – Kido Worm

Leave a Comment

The new worm blast that affects almost all Windows versions listens to the name of Conficker or Downadup or Kido. It is estimated that around 50000 computers per hour are being infected with the Conficker worm all over the world. This worm spreads itself by exploiting the Microsoft vulnerability MS08-067. It is a very clever […]

[Continue reading]

Filed Under: Computer Virus Education, Home Computer Security, Software Tools Tagged With: conficker, conficker worm, downadup, kido

Adobe Reader and Acrobat JBIG2 Processing Multiple Vulnerabilities

Leave a Comment

Description: Adobe Acrobat is a program designed to create, manage and view Portable Document Format (PDF) and Adobe Reader is designed to only view and print PDF’s. Both Adobe Acrobat and Reader have buffer overflow vulnerabilities while handling JBIG2 streams inside a PDF file. JBIG2 is an image encoding standard for encoding bi-level images. One […]

[Continue reading]

Filed Under: Home Computer Security, Information Security, Network Security Tagged With: adobe reader vulnerabilities

Microsoft Buffer Overflow Vulnerability on Graphical Device Interface GDIPlus EMF

Leave a Comment

There is a Critical Microsoft vulnerability discovered these days affecting almost all windows versions: Description: Graphics Device Interface (GDI) is an application programming interface by Microsoft Windows. It’s a core operating system component responsible for representing graphical objects. Microsoft Windows GDI has integer overflow vulnerability in gdiplus.dll while processing Enhanced Metafile (EMF) files. Possible vectors […]

[Continue reading]

Filed Under: Home Computer Security, Information Security, Network Security Tagged With: microsoft vulnerability gdi

Virus Evolution History Part 2 – Melissa and other executable worms

Leave a Comment

The powerful file interpreter scripts included in Microsoft Office gave to the virus creators an opportunity to be armed with the characteristics of worms. An example of this was Melissa worm, a Word macro virus with the characteristics of a worm, which infected documents created with the 97 and 2000 versions of Word. This worm […]

[Continue reading]

Filed Under: Computer Virus Education, Home Computer Security Tagged With: melissa worm, virus

Virus Evolution History – Part 1

Leave a Comment

In this article we will examine how the growth of Windows and Visual Basic affected the evolution of computer viruses, since along with the development of those two technologies we had the appearance of global virus epidemics, like the virus Melissa in 1999. While Windows were evolving as an application designed to facilitate the management […]

[Continue reading]

Filed Under: Computer Virus Education, Home Computer Security Tagged With: antivirus, virus, virus evolution

Fujitsu Flepia – The new Kindle

Leave a Comment

Fujitsu got jealous of Amazon and created the color version of Kindle ! The new product is designed to read newspapers electronically, and is being tested these days by Fujitsu in various cafes in Japan. It is a very thin display device with e-ink technology (electronic ink) that consumes minimal battery energy (50 hours of […]

[Continue reading]

Filed Under: General Technology Tagged With: fujitsu flepia, kindle

Which are the biggest companies in the Antivirus arena

Leave a Comment

Everyone in the United States has heard of the leading antivirus vendors such as Mcafee, Trend Micro, Symantec, Computer Associates etc. These companies have market-leading presence in the United States. Microsoft, as well, has plans to become a key player in this market. Microsoft acquired intellectual property and technology from GeCad software in 2003, a […]

[Continue reading]

Filed Under: General Technology, Home Computer Security Tagged With: antivirus companies, biggest antivirus companies, Computer Associates, Mcafee, Symantec, Trend Micro

Data security on the internet – DES and RSA Encryption

Leave a Comment

Have you ever wondered what happens when sending personal data via the Internet (eg via e-mail)? When you send your message, this becomes accessible from multiple computers, and a third person could take it and read. Imagine now if the government or military messages could be read by prospective Hackers what would happen. There should […]

[Continue reading]

Filed Under: Information Security, Network Security Tagged With: data encryption, data security, des. rsa

  • « Previous Page
  • 1
  • …
  • 5
  • 6
  • 7
  • 8
  • 9
  • …
  • 19
  • Next Page »

Recent Posts

  • VoIP Tutorial
  • In Review – Sylvania Netbook
  • Choosing the Right 7 Inch Tablet PC For You
  • Wireless Access Point Reviews – How and Why Standards Matter
  • Types Of Wireless Speaker Adapters

Categories

  • Cisco Certifications
  • Cisco Firewall
  • Computer Virus Education
  • General Technology
  • Home Computer Security
  • Home Network Setup
  • Home Security IP Cameras
  • Information Security
  • IP Network Tutorials
  • IP Telephony and VoIP
  • Network Security
  • Networking Acronyms
  • OSI Layers
  • Software Tools
  • Technology News
  • Troubleshooting
  • Usefull Network Info
  • Wii Game Console
  • Windows
  • Wireless Networks
  • XBOX and PS3 Networking
  • XBOX PS3 and Wii News

Copyright © 2025 · | Contact | About | Privacy Policy

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept All”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie SettingsAccept All
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT