Network Security

  • AirSet - Cloud Computing for Everyone

    Need a computer everywhere you go? Need to collaborate with co-works from anywhere? AirSet has created web computing for everyone. A powerful web application that allows end users to work with a web computer
    By Steve Mallard July 4, 2011 

  • Open SCADA Security Project

    SCADA is a technology that focuses on the automation of utilities. These utilities include items such as chemical, power, gas, water, oil and other items along these lines. The security among these types of infrastructures is imperative to the safety...
    By Steve Mallard July 4, 2011 

  • System Spec Version 2.65 - A Good System Specification Tool

    Need to find out information about a computer's system? System Spec Version 2.65 is an excellent tool that can be kept on your flash drive. System Spec gives a basic overview for members of your information technology department. System Spec is...
    By Steve Mallard July 4, 2011 


  • Encrypt Your USB Flash Drive

    Encryption plays a major role in the security of any organization. One of the biggest nightmares IT personnel face is the use of flash drives. These thumbdrives (flash drives) are often lost with personal and confidential information.
    By Steve Mallard July 4, 2011 

  • The Dangers of Alternate Data Streams - Files Hidden Inside of other Files

    Security Analyst often aren't trained in the dangers of file streaming through NTFS's Alternate Data Streams. This tutorial teaches you how to create and detect it. Files can be hidden within files. These files can hide porn, company secrets or...
    By Steve Mallard July 4, 2011 

  • The Value of Information Technology Certifications

    What certifications should you obtain? How valuable are certifications? Many companies value certifications and use these in lieu of college degrees. With all of the certifications available, just how valuable are these certifications?
    By Steve Mallard July 4, 2011 


  • The ISO 27001 AND 27002 Information Security Standards

    This article looks at information security standards for enterprise-level businesses and data protection and privacy as well as the certification process.
    By Steve Mallard July 4, 2011 

  • Hardening Your SQL Server

    Need to lock down your SQL Server 2005 or 2008? SQL Servers are a prime target for hackers and worms. Corporations assets are generally customer data which is stored in databases on these SQL servers. Administrators must take precautions to harden...
    By Steve Mallard July 4, 2011 

  • HTTPS Vulnerability

    Everyone including myself use to think that https:// (the internet protocol for secure hypertext transfer protocol) was secure. This may not be the case anymore. With different tools, https has vulnerabilities that can be compromised...
    By Steve Mallard July 4, 2011 

  • DoD Contractors to be 8570.1 Compliant

    What is 8570.1 Compliance? 8570.1 provides guidance and procedures for the training, certification, and management of the Department of Defense contractors and workforce who work in Information Assurance and Information Technology. This line of security...
    By Steve Mallard July 4, 2011 
showing 41-50 of 154 < Previous   |   page: 3   4   5   6   7  ...   |   Next >