Faster Internet Speed Using DNS
Increase your internet speeds and security using free alternative DNS services! DNS (Domain name System) translates the domain names you put into a browsers to IP addresses needed to access a site. Internet service providers (ISP’s) will usually assign DNS servers for you automatically when you are connected to the internet. If a DNS Server […] more…
Google Search Tips
Google makes it possible to reach not just publicly available Internet resources, but also some that should never have been revealed. site restricts results to sites within the specified domain. site:google.com fox will find all sites containing the word fox, located within the *.google.com domain intitle restricts results to documents whose title contains the specified […] more…
Secure Your Password
Are you one of the many people that have the password 123456, or your birthday, or your child’s name, or a loved one? You need a better password immediately. Because of your weak password you are at risk of having your bank account emptied, email/social media accounts compromised, and work documents dissappearing. For most people […] more…
What is Kali Linux
Offensive Security Introduces Kali Linux Free All-in-One Solution for Professional Security Auditing Popular BackTrack Linux Evolves Into Mature, Enterprise-Ready Penetration Testing Toolkit. Black Hat Europe, Amsterdam – March 13 – Offensive Security today announced the availability of Kali Linux, the evolution of its popular BackTrack Linux, a free security auditing operating system and toolkit. Showcased at Black Hat Europe in Amsterdam, […] more…
The Stages Of Security Analysis
An analysis can determine if your network is protected from unwanted intrusion. To perform a security analysis you must develop a plan, perform the audit, then report your findings. Site scans: Test port and application layers against internal defenses Remote Audits: Test external services from attacks (ISP, Hosts, Servers, Etc) Penetration Tests: This tests the […] more…
How To Disappear Off The Grid
Reasons To Go Off The Grid There are many reasons to live away from the digital world. Whether its to get away from all those digital advertisements through emails or through the multitudes of social media websites popping up everywhere. Maybe you just want to leave for a vacation, or in extreme situations start a […] more…
Eight Major Elements Of Computer Security
National Institute Of Security Technology (NIST) lists 8 major elements of computer security 1. Computer security should support the mission of the organization. 2. Computer security is an integral element of sound management. 3. Computer security should be cost-effective. 4. Computer security responsibilities and accountability should be made explicit. 5. System owners have computer security […] more…
What is IP Spoofing
What is IP Spoofing? To gain access, intruders create packets with spoofed source IP addresses. This exploits applications that use authentication based on IP addresses and leads to unauthorized user and possibly root access on the targeted system. It is possible to route packets through filtering-router firewalls if they are not configured to filter incoming […] more…
What Do Social Engineers Look For?
What is Social Engineering? Social engineering is the art of gaining access to buildings, systems or data by exploiting human psychology, rather than by breaking in or using technical hacking techniques. Items that scammers find valuable include the following: Passwords Account numbers Keys Any personal information Access cards and identity badges Phone lists Details of […] more…
10 Quick Facts About XSS Viruses and Worms: What You Need to Know
XSS Outbreaks: 1. Are likely to originate on popular websites with community-driven features such as social networking, blogs, user reviews, message boards, chat rooms, Web mail, and wikis. 2. Can occur at any time because the vulnerability (Cross-Site Scripting) required for propagation exists in over 80% of all websites. 3 Are capable of propagating faster […] more…
The Ten Immutable Laws of Security
1. If a bad guy can persuade you to run his program on your computer, it’s not your computer anymore. 2. If a bad guy can alter the operating system on your computer, it’s not your computer anymore. 3 .If a bad guy has unrestricted physical access to your computer, it’s not your computer anymore. […] more…
Simple Web Security Design
While there are many opinions and most of the details to building with security in mind come from the logic of the programmer and their skill with the programming language, these basic guidelines are also derived from materials available from the OSSTMM . 1. Assure security does not require user decisions. 2. Assure business justifications for all […] more…
8 Types Of Hackers
According to the EC-Council’s Certified Ethical Hacking 9 certification hackers can be classified into 8 categories 1. Black Hats Individuals with extraordinary computing skills, resorting to malicious or destructive activities. These people are also known as crackers. 2. White Hats Individuals who profess hacking skills and use them for defensive purposes. They are also known as […] more…
Biggest Financial Mistakes
1. Buying a new car Buying a new car isn’t the end of the world, but it will significantly slow down your path to financial independence. By financing a car with a loan, you are paying for something that depreciates in value every single year, while your payments stay the same. A car’s value immediately […] more…
Guidelines for Building Secure Web Applications
While there are many opinions and most of the details to building with security in mind comefrom the logic of the programmer and their skill with the programming language, these basicguidelines are also derived from materials available from the OSSTMM . 1. Assure security does not require user decisions.2. Assure business justifications for all inputs […] more…
Quora Data Breach
What is Quora? Quora is a information sharing website for to ask questions and more. Who is affected? Approximately 100 million users’ data have been breached. Information such as names, email addresses, encrypted passwords, and public content has been compromised. Also non public information such as answer requests, downvotes, and direct messages may have been […] more…
2017 Antivirus News | Powered by WordPress |
Fluxipress Theme
| Show My IP Address, check blacklists
| Free Favicon, Android and Apple Icon Generator
| Bitcoin and Crypto Currency News
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish.Accept Read More Privacy & Cookies Policy