Articles [PC & Internet Security]

How to block unwanted websites   You can try using something like parental control software like: cyber patrol parental control, Parental control bar, Safe Families We-Blocker Parental Control. if you are browser specific and using internet...

IntroductionA digital signature serves many purposes. It doesn't just validate data, but is truly a fingerprint from the sender. The digital signature depends on the key pair, the data of the message, and a signature. All these elements are mapped...

Ensuring data integrity is a very important part of computer science, from the Web page to software that is being ordered off the Web. If files are not periodically checked, then viruses and Trojans can be inserted into the data without the...

The network services that bind to TCP ports provide direct access to the host system. If the service provides access to the hard drive, then any remote user has the potential to access the hard drive. Whereas network protocols such as IP and IPv6...

The physical world and the digital world have many similarities when it comes to security processes. The need for authentication, authorization, confidentiality, and integrity do not change from the physical world to the digital one. They do,...

There are four basic principles that apply for most security systems: authentication, authorization, confidentiality, and integrity. Authentication (proving identity with credentials) – Authentication is the process of proving the identity of a...

The old adage "Information is power" is more true than ever for the corporate world. Even the release of very general information about a company (for example, an upcoming merger between company A and company B) can have a profound impact on a...

Deleted.

Deleted.

    In this article the Common Criteria (CC), an effort by the international community to define a standard set of evaluation criteria for IT security, and then it presents a starting point for you to explore and gather your application's...

Powered by CjBlog