Network Security

  • Recovering Corporate Data After a Data Security Attack

    In this article, we continue the series on data security incident management with an examination of what happens after a software or human security threat is identified and contained: eliminate the data security threat and restore data and network...
    By Tom Olzak, CISSP July 4, 2011 

  • Preventing and Containing Data Loss by Detecting and Analyzing Data Security Issues

    In Part 1 we defined data incident management and examined how to prepare for incidents when they occur. In this article, we continue the series by examining how to prevent data loss and network outages. The methods of detecting, analyzing, and reporting...
    By Tom Olzak, CISSP July 4, 2011 

  • Net Nanny 5.6 - Minds the Kids While They Surf

    Net Nanny is one of the best-known brands in its genre, but as other products added features it lacked, it fell behind the competition. After ContentWatch bought it and merged with its ContentProtect, though, Net Nanny is a leader again.
    By Tony Bradley July 4, 2011 


  • CYBERsitter 9.0 Review - Babysit Your Kids' PC Activity

    CYBERsitter is a well-respected, capable product within its category. It has been around for quite a while and does a fair job of blocking access to questionable websites. Upon close review I found some issues; it lags behind the competition in functionality...
    By Tony Bradley July 4, 2011 

  • Norton Confidential - Not Worth the Investment

    Norton Confidential promises to keep your personal information protected when you're surfing the Web or shopping online, but a variety of issues combine to reduce the value and performance of this product.
    By Tony Bradley July 4, 2011 

  • Hardening Microsoft Exchange 2007

    Default settings in Exchange Server 2007 are that no unencrypted sessions are allowed. This server uses its own self signed certificate (This certificate should be replaced with a trusted certificate from a Certificate Authority) to secure individual...
    By Steve Mallard July 4, 2011 


  • Is Your Computer Safe? Use the US CERT Website

    The United States Computer Emergency Readiness Team at us-cert.org is a partnership between the Department of Homeland Security and the public and private sectors. Everyone should utilize this resource as a early warning system for their computer networks...
    By Steve Mallard July 4, 2011 

  • Increase the Performance of an IDS or Network Security Monitor on Ubuntu

    Running Snort, IDS or Network Monitor on Ubuntu? Many Enterprise locations use Linux or Ubuntu to run IDS or intrusion software on their networks. IDS systems usually hit the system resources of even the most powerful Linux machines. To speed up the...
    By Steve Mallard July 4, 2011 

  • WatchGuard Firewalls

    Need to protect your valuable assets? Look for an economically feasible solution? WatchGuard Firewalls offer an entire product line that allows affordable protection without sacrificing features.
    By Steve Mallard July 4, 2011 

  • Explanation of the Domain Name System and Windows Server 2008

    Domain Name System, also known as DNS, is a server system that use a hierarchal structure of named computers and network services. This allows the user friendly name to be mapped to a specific IP address. DNS service is a required fundamental service...
    By Steve Mallard July 4, 2011 
showing 31-40 of 154 < Previous   |   page: 2   3   4   5   6  ...   |   Next >