Information Security Concepts: Authenticity
Authenticity is the fourth and final core concept we will explore. What do we mean by authenticity in Information Security? Authenticity is assurance …
Continue ReadingAuthenticity is the fourth and final core concept we will explore. What do we mean by authenticity in Information Security? Authenticity is assurance …
Continue ReadingMS Access database queries help us boil down, manipulate and use our data in instant and powerful ways. Using the database query design object, we can …
Continue ReadingWhen you open two Excel files, they typically open in the same instance of Excel. However, there are a few ways to open them in separate windows.
Continue ReadingNo software can ever be completely secure just be installing it then forgetting about it. It is same with Exchange Server 2007, however these best …
Continue ReadingIn recent years, phishing scams have become increasingly common. This wave of threat has lead to another way of performing a scam, over the voice …
Continue ReadingThis is a basic tutorial on Windows Live Mail. Teaching the basics on easy use. Adding new accounts and managing them are the key features.
Continue ReadingWord 2007 has some powerful tools to help every level of writer. Whether you are writing a freelance article or a formal research paper, the Word 2007 …
Continue ReadingIt’s not safe anymore to visit a website and hope that it’s safe. Even well-known websites can be compromised and used to deliver viruses and …
Continue ReadingAvailability is the third of four concepts examined in this series of articles. In the ubiquitous Internet and wireless access era, information must …
Continue ReadingOutlook and Thunderbird are the two major email clients and this article compares the security features of these two email clients considering spam …
Continue ReadingBeen watching a lot of Hulu lately? In no time, that flash player might be replaced with Microsoft’s new Silverlight interface. Wondering why? …
Continue ReadingCloud computing may sound like magic, but its tangible results are already in front of us - and as such, are we ready for the revolution it’ll …
Continue Reading