Showing category "Security" (Show all posts)

Cloud Computing Security

Posted by Oyya-Info on Sunday, November 21, 2010, In : Security 
Before diving into the security aspects of cloud computing, let us first understand the basic concept of cloud computing. In cloud computing, cloud stands for internet and computing means using computer technology, hardware, and software, i.e. using or sharing the computer technology, hardware and software over the internet. Different cloud service models are as follows:
  • Cloud Software as a Service (SaaS): In this service model, the consumer uses the provider’s applications on a cloud ...

Continue reading ...
 

How to Block a Specific Website on your computer

Posted by vijai s on Tuesday, June 22, 2010, In : Security 

There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.

Depending on the level of security you wish, learning how to block a website may require a adjustments of your web browser, the use of internet filtering software or editing of your host file. At any...

Continue reading ...
 

The Ten Most Important Steps You Can Take to Protect Your PC

Posted by Oyya-Info on Saturday, May 1, 2010, In : Security 

Many agree that Windows computers need to be protected with a strategy called defense in depth. This is not just for fighting off viruses. Clearly, network security and Internet Explorer also need defense in depth. When Internet Explorer was recently hacked in a public contest, Microsoft responded that "...defense in depth techniques aren't designed to prevent every attack forever, but to instead make it significantly harder to exploit a vulnerability."

To me, the term "defense in d...


Continue reading ...
 

Top 10 Hacker Attack Tools

Posted by Oyya-Info on Thursday, October 15, 2009, In : Security 

Computer security "agents" must master the same tools used by the hackers they seek, and many of these programs are available to download for free. The man-in-the middle attack, (also known as the monkey-in-the middle) is a useful method of scanning network data and extracting what is known as interesting data, (passwords, e-mail, data files). Listed below you will find 10 programs used to assault and defend networks around the world.

1. Ethereal is the most widely used network protocol analy...


Continue reading ...
 

Utilities for Nothing, Security for Free

Posted by Oyya-Info on Thursday, October 15, 2009, In : Security 

Free utilities may lack the polished interface and some of the features you typically get with commercial software, but for most people, free security software can be a cost-effective way to protect one or more PCs.

Protecting your PCs from online threats isn't as simple or inexpensive as it once was. Just like there's no single pill that covers everything from a headache to a sore throat, there's no one piece of software that will protect your system from the various Internet-borne nasties ...


Continue reading ...
 

NewFolder.exe Virus

Posted by Oyya-Info on Sunday, October 11, 2009, In : Security 

The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder.exe. You can also find it in your processes list with name newfolder.exe or Iddono.


NewFolder.exe File Behaviour

NEW FOLDER.EXE has been seen to perform the following behavior:
  • The Process is packed and/or encrypted using a software packing process
  • Found on infected systems and resists interrogatio...

Continue reading ...
 
 
 

 

Make a free website with Yola