Articles [PC & Internet Security]

Password theft is becoming the most dangerous crime in our cyber society. Many times having no knowledge about cyber security leads people to beome victim of cyber-crime and loses their important money, data and much more. So at this point...

A system is a set of artifacts that together achieve some outcome. An information system is a system that achieves a business outcome. An information system collects, manipulates stores and reports information regarding the business activates of an...

As people depend on computers for anything and everything they often try to get their tasks done at the earliest ignoring the threats and risks out there in the cyber world. All we do is install an antivirus program on our computer and then we’re...

Gone are the days when cell phones were only used to talk with each other or to play some games like Snake that came by default with the device. Now as we have moved along with time things have changed so rapidly and abruptly that cells have become...

Now-a-days it is quite important to keep your data safe so that you can retrieve it later if required. There are many ways by which you can keep your data safe by external storage devices like pen drives, blank Cd's and DVDs. But today I am going...

Security Protocol Protocol is a set of rules for communicating one & another PCs in public & private network. There are various types of Security Protocol for specific purposes as communication Protocol, Security Protocol 1 FTP- It...

Internet has become part of our society. It is a useful medium, but danger is often lurking. There are also people who abuse the potential of this global computer network. Chatrooms The time when the Internet was used only for business and most...

Benefits of ISA Enterprise Edition • Supports over 4 CPU and over 2 GB of RAM • Up to 32 nodes with Network load balancing • Unlimited caching arrays with Cache Array Routing Protocol (CARP) • Supports enterprise-wide (array) policies using...

Security Policies • Security policies govern security for the enterprise. • The security policy would detail your firewall rules. For example, this policy would define what traffic is allowed in and out of your network, by who, when, and what...

                                   MALICIOUS SOFTWARE What is malicious software? A software that has been intentionally included or inserted in a system , mainly for any harmful purpose. They are mainly of 2 categories:  1. A Host...

Powered by CjBlog