Posts Tagged ‘Computer security’

Password SecurityCloud-based services, aka services that store your information on a server as opposed to your own hard drive, have been embraced by individuals and business users alike.

Everything from banking apps, email and even social media accounts are now all accessible via the Cloud on multiple devices with nothing more than an internet connection, which means we’re able to enjoy a greater range of services than ever before.

However, cloud accounts require passwords to restrict user access, and with so many accounts to keep track of, it’s tempting to use the same run-of-the-mill passwords for multiple services. It might be a very convenient way of doing things (after all, you need to be able to remember your logins), but by sticking to what you know, you’re increasing your vulnerability online and compromising the security of your cloud data. (more…)

Physical Access to a ComputerWe continue our series of articles on COMPUTER security. Today we offer the second part of the article “Physical Access to a Computer and Data”.

Here’s the first part of the article

This part of the article describes following questions of the computer security:

  • Limited Access to Programs
  • LOCK ACTION WITH Kaspersky Internet Security
  • Control Access to Files And Folders
  • ON GUARD – Bio-Scanners
  • Restricting access to the BIOS


Physical Access to a ComputerToday we begin a series of articles about computer security. In this series we will look at the following aspects of computer security:

• Physical access to a computer and data
• Security of data and system
• Security of home network
• Anti-virus security
• Protection from spam and advertising (more…)

White HatFor every bad hacker there’s a good one. Here we look at six white hat hackers who have contributed to security advances.

Despite gaining a less than desirable reputation, hacking has not always been the tool of evil.

White hat hackers – those technological boffins who use their skills to help others to improve their security – are just as prolific as black hat hackers. Here are six white hats you wouldn’t want to mess with. (more…)

FirewallWith the rapid growth in Internet usage, equating to approximately 2.5 billion users, network threats are on the rise. Traditional firewalls and unified threat management (UTM) products can no longer withstand various malicious threats on applications and files.

So how does the technology industry intend on protecting our computers in the future?

How firewalls work

The basic definition of what a firewall does is that it forms a barrier to keep destructive forces away from your computer.

Its job is similar to a physical firewall that keeps a fire from spreading from one area to the next. It acts like a filter between your computer and the internet. You can program what you want to access and what you don’t want to get in, everything else is not allowed.

Firewalls can prevent access to certain websites and outside computers from accessing those inside a network. (more…)

hide ssdMost modern routers ship in a secure state, but you still have to configure them to work with your devices. Depending on your router’s configuration and which operating system you use, this can be difficult or easy.

The Easiest Router Security Configuration

The easiest configuration option for your router is one-button configuration. If your router has a button on top and your computer or device supports one-touch configuration, simply start configuring your computer and press the button on your router when your computer tells you to.

Your router will send all of the information your computer needs and you will automatically be connected to the Internet. Your computer should save the configuration settings so you don’t need to press the router button again for that computer. (more…)

MicrosoftMicrosoft has announced the release of a new version of its stand-alone security tools – Enhanced Mitigation Experience Toolkit (EMET), allowing to block potentially dangerous activity on your PC and prevent malicious attacks of originating objects.

New EMET 4.0 is now even more easy to use, with the option Configuration Wizard helps you to quickly set up the program, and an improved interface provides instant access to all the functions of the application. Useful innovation EMET 4.0 – additional control SSL / TLS-certificates in the browser Internet Explorer. It can be configured in such a way that access to individual sites opened only in the presence of the specified (or trustees meet certain criteria) certificates. This will help prevent attacks Men-in-the-Middle, which use bogus certificates to decrypt HTTPS-traffic. (more…)

information securityComputer security today is as important as personal safety.

We are dealing with computers in offices, banks, shops and houses. With the growing number of so-called computer crime increases and the need for compliance with the rules of computer security.

The present level of development of the various computer technologies into the hands of criminals gave a very powerful and yet simple tool with which “hack” someone’s personal computer is not difficult, even a schoolboy. Therefore, to date computer security is also relevant for the usual and ordinary users.

Who may need my computer? – You ask – it is not a state secret, nor access to billions of dollars. In fact, the “hacked” computer can present a serious threat. For example, attackers can still use your PC for DDoS-attacks – and you know it, your Internet traffic “eat” all the money from the account … (more…)