Security Testing

  • Why and How Zombie Computers put you at Risk

    Here’s all you want to know about zombie computers such as how they are used by cybercriminals in DoS attacks and for sending out Spam for example. In this article you also find tips for preventing your computer from becoming a zombie and what to...
    By Mark Muller August 8, 2011 

  • Bluejacking and Bluesnarfing explained in a Nutshell

    Here’s what Bluejacking is and all you need to know about to protect you from receiving unsolicited messages by means of Bluetooth. This article additionally contains information about Bluesnarfing, a dangerous attack which uses the same Bluetooth...
    By Mark Muller August 8, 2011 

  • Here’s why you should consider switching to Windows Vista for more security

    Windows security has been given high priority in Vista development. The ten top security reasons to use Windows Vista will show why Vista is the most secure desktop operating system ever built by Microsoft - much more difficult to exploit. The best Vista...
    By Mark Muller August 8, 2011 

  • How to Secure Your Network with a Honeypot

    Honeypots are flexible and come in various shapes and size. The two broad types are low interaction and high interaction types. A low interaction windows honeypot is plug and play. High interaction honeypots are complex and require dedicated resources...
    By N Nayab July 14, 2011 

  • What PGP Desktop is and How it Works

    PGP Desktop 9.9 is a software suite for secure email, safe storage on disks, protected shared storage, as well as armored or self-decrypting archives. PGP Desktop provides individuals and companies comprehensive security for mobile computers and desktops...
    By Mark Muller June 22, 2011 

  • Making your Email Secure with Pretty Good Privacy

    This article explains how to secure emails with PGP Desktop Email by introducing two fictive users Alice and Bob who install and setup PGP Desktop Email to prevent their emails from being spied on.
    By Mark Muller June 22, 2011 

  • A Review of Trend Micro's Smart Surfing for Mac

    If ever there was a struggle to gain ground in the anti-malware world, the battle for Mac OS users is one of the most heated. In the midst of this struggle is the recently released Trend Micro product, Smart Surfing for Mac.
    By Matt Isaac May 22, 2011 

  • Free Anti-rootkit Applications for Windows

    The good days are gone when we needed only an antivirus and a firewall to protect ourselves. The threats just got more serious, working at the lowest level of your operating system. These nasty programs are named rootkits and here is the top free anti...
    By Tolga BALCI May 20, 2011 

  • Computer Workplace Privacy and Law

    The accelerated use of IT in the workplace for business and personal purposes has generated important privacy concerns because of the substantial amounts of data that is collected about employees by employers.
    By Daniel Brecht May 19, 2011 

  • Google’s Free Security Software: How Google Pack Compares to Other Free Security Programs

    Google Pack is free and includes PC Tools’ Spyware Doctor security software and Norton Security Scan from Symantec. Here you find all you want to know about Google Pack including how Google Pack compares to other free security programs, and much...
    By Mark Muller May 18, 2011 
showing 1-10 of 39 < Previous   |   page: 1   2   3   4   |   Next >