Categories
: PC & Internet Security (119)
Articles [PC & Internet Security]
Elementary precautions
Cyber cafes are very popular in our counry. The revolutions in technology ensures that everyones has a use for internet. People mainly use cyber cafes for browsing internet,checking thier mails and chatting.
The first thing...
Keyblogger is basically a spyware. As indicated by its namesake, it logs or recors your keystrokes. When you type in your username or password, this information is logged and amde available to the hacker. Keyloggers can either be physical or...
Computer is a fast speeding work system. Many uses from this computer, perfect work, it is better than that manual work. Man can do heavy work. Ten men work and eight hours works, that system do it easy in an hour. This is capacity of computer...
There are lots of Anti virus software available in market today, and all claims to be very much effective and providing 100% protection. Before you choose any Anti virus solution first find out the system requirement. Then you can decide which...
A firewall is a part of a computer system used to prevent any unauthorized access and allows safe communications. It can be implemented by hardware or software, or combination of both.Each firewall has different kind of authorisation criteria.
The...
Definition of an intranet: A standards-based infrastructure and Internet technologies to support information sharing within a well defined and limited.
Problem: Although an intranet is a private network in which the groups have well-defined and...
3. Application examples policy
Password policy: They are one of the most important policies, because usually the passwords are the first and perhaps only way authentication, and therefore the only line of defense against attacks. They establish...
Local Access Control.
What is it? The LACF allows different access controls for directory or subdirectory of the tree, the file is usually called. Htaccess.
One can deny the use of potentially hazardous SSI which cause the server to execute...
Other methods of authentication:
Hash Functions
What is it?
Using the password you typed, the browser creates a string using the password and other information including AuthRealm (authentication domain) and passes through the MD5...
The improvement to be applied depends on the amount of security required. Can be applied to security improvements in the following ways:
When you specify attributes in the S-http hyperlinks
Insurance client browsers need to know when...
Powered by CjBlog