A network is two or more computers linked together in order to share data. From a security standpoint, the problem with networks is that unauthorized individuals might also be able to access that data.
read more | digg story
Wednesday, March 19, 2008
Users continue to compromise federal computer networks
More than half of government IT professionals know of violations in security protocols, according to a recent survey. Funding challenges hinder agencies' ability to put proper security measures in place, while lack of systems and requirements standardization creates confusion in the market...
read more | digg story
read more | digg story
Identification Management
Identity management also has become the main issue in information security. Governments businesses and private sectors are taking advantage of identity management systems to provide and control access to places and services such as buildings, bank accounts, and computer applications.
read more | digg story
read more | digg story
Virus Prevention
Having an anti-virus program installed and running on your PC is by far one the best virus prevention techniques. An anti-virus program constantly scans and monitors your computer for any suspicious files or activity. You can also schedule automatic system scans to automate your system security....
read more | digg story
read more | digg story
What is computer virus?
Computer viruses are small software programs that are designed to spread from one computer to another and to interfere with computer operation....
read more | digg story
read more | digg story
Tuesday, March 18, 2008
How to check if your antivirus is working
Most of the time we just install the antivirus or the anti Malware programs and relax that they are working fine and one fine morning you see things not working and finally you realize that its your antivirus program which was not working at all. Here is a small test which you can do in case you are not sure if your antivirus program is working ok
read more | digg story
read more | digg story
What a closed Internet looks like -
For a glimpse of their vision for the future of the Internet, look no further than the headlines of the past few weeks. The biggest story has been the phone companies -- yes, the same companies who insist you can trust them to control the Internet -- demanding retroactive immunity from Congress for spying on your phone calls without a warrant.
read more | digg story
read more | digg story
Monday, March 17, 2008
Speed Up Linux
Overall, Linux is not known as a resource hog. The free operating system is a fairly lean machine out of the box -- some distributions moreso than others. Still, there are some tweaks you can make to any Linux installation to speed things up.
read more | digg story
read more | digg story
Get Back your Screen Space: Maximize Firefox Viewing Area
I have a few toolbars and around ten extensions installed whose configurations and buttons seemed to have loaded up the Firefox interface with a lot of junk. So I was hunting around for a few tricks that may help me gain some more web viewing space. Here are a few tweaks and extensions I found
read more | digg story
read more | digg story
40% of all spam comes from just one source
Six bots are responsible for 85% of all spam and one of them for 39% of all spam in the world
read more | digg story
read more | digg story
Intel and MS Enlist UC Berkeley For Multithreading Research
Even today, most software applications on the market don't take advantage of these multi-core chips fully and too many compute cycles are wasted. What's wrong with this picture? Obviously the task at hand isn't as easy as it would seem. Let's hope the kids at UC Berkely are alright and put those funds to good use.
read more | digg story
read more | digg story
Retail Vista SP1 and final XP SP3 expected this week
Microsoft is poised to release Windows Vista Service Pack (SP1) to the retail channel this week. And the final release-to-manufacturing (RTM) of Windows XP SP3 is not far behind, according to testing sources.
read more | digg story
read more | digg story
Intel Talks Up Six Cores, Nehalem, Graphics
ChannelWeb Intel offered a peek at its roadmap on Monday, serving up a six-core server processor codenamed Dunnington due out this year, an overview of the Nehalem microarchitecture that will replace Core as part of its "tock" strategy ...
read more | digg story
read more | digg story
Sun spills the beans on Intel/Microsoft announcement
Intel and Microsoft are planning a make a major announcement about a “joint research undertaking with universities” tomorrow. A note sent by Sun to journalists late Monday confirms: Intel and Microsoft are approaching universities to educate a new generation of multi-core developers.
read more | digg story
read more | digg story
Installing Windows XP On A SATA Drive
I have come across this problem whilst working on a clients computer, thought I would share a quick guide for installing Windows XP on a computer with a SATA drive.
read more | digg story
read more | digg story
Review: Firefox maintains edge over Microsoft in browser war
Firefox 3 beta beefs up usability and security, while superior speed and standards support make it the browser to beat.
read more | digg story
read more | digg story
Sunday, March 16, 2008
The Top 10 Problems with IT Certification in 2008
Warren Wyrostek calls on personal and real-world experience to share the top 10 problems with IT certification in 2007/2008.
read more | digg story
read more | digg story
Friday, March 14, 2008
What happens when a Windows developer gets a Mac?
Follow the daily travails of a hardcore, longtime Windows developer after he adopts a shiny new MacBook.
read more | digg story
read more | digg story
*THE* classic Unix horror story
Have you ever left your terminal logged in, only to find when you came back to it that a (supposed) friend had typed "rm -rf ~/*" and was hovering over the keyboard with threats along the lines of "lend me a fiver 'til Thursday, or I hit return"?
read more | digg story
read more | digg story
Some viruses come pre-installed on newly purchased devices
From iPods to navigation systems, some of today's hottest gadgets are landing on store shelves with some unwanted extras from the factory — pre-installed viruses that steal passwords, open doors for hackers and make computers spew spam.
read more | digg story
read more | digg story
Run Windows Apps Seamlessly Inside Linux
You can have Windows apps running right on your Linux desktop and sharing the same desktop files. It's relatively painless, it takes only a little bit longer than a Windows XP install, and it works just like virtualizing Windows on a Mac with Parallels Coherence -except it's free. Here's how to do it.
read more | digg story
read more | digg story
Friday, March 7, 2008
Pentagon attack last June stole an "amazing amount" of data
The cyberattack that penetrated the Pentagon in June, 2007 did more damage than immediately reported. According to one Department of Defense official, the organization lost huge amounts of data through an already-known Windows exploit.
read more | digg story
read more | digg story
Monday, March 3, 2008
Everex launches a tiny Linux PC - The Everex gPC Mini
Everex, the company that brought us the Cloudbook is going after Mini PCs like the Mac Mini with this Linux Powered Mini PC.
read more | digg story
read more | digg story
First spam felony conviction upheld: no free speech to spam
Virginia's Supreme Court on Friday upheld the first US felony conviction for spamming, narrowly denying an appeal that argued that spamming was protected by the First Amendment.
read more | digg story
read more | digg story
Subscribe to:
Posts (Atom)