IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Playing with Algorithms and Numbers

17 February 2007 By Saran

The main gist of security conscious and malicious programmers is to play with the known algorithms where most of the problems can be created and avoided. The never ending search for understanding algorithms has been a given today. Malware development has been obviously aggressive and the issues and plagues that it has continued to spread is really something that keeps technology people up on their feet.

Algorithm Hacker

The best way is to be aware of possibilities. The Internet is known to be always up to date with such risks, but overall, a person aware of the capabilities of such should know beforehand that spyware, malware and Trojans can easily penetrate systems without notice if they are not secured properly.

Such security breaches and issues are placed under the tutelage of network administrators and officers. Being aware of such potential risks beforehand is something that they should be aware of. Besides, it is also a given that most of these professionals are aware of such risks since they are always logged on the web.

Filed Under: Cryptography, IT Security Basics, Malware, Network Security, Privacy & Anonymity, Programming, Security Policies, Spyware Tagged With: administration, algorithms, Malware, Network Security, Spyware, trojans

Firewalls and Wide Area Network (WAN ) Intrusions

18 January 2007 By Saran

Experiencing connection problems and slow transfer of data may occur at any given time for most networks. While most would immediately identify the network cards, computers, cabling or network configuration at first, the presence of unknown processes of the operating system or possible intrusions such as DOS or Ping attacks can also be considered as possible factors for the deteriorating speed issues for network administrators.

Firewalls

Such instances are only normal, especially for wide area networks, or networks exposed to the Internet. The mischief caused by such people can be expected, especially for people who love to try their talent in hacking and network intrusions. The prize of which is that of creating discomfort and headaches for companies that thrive on networks for business and profit.

While there are network monitors available, it would be best to get the best firewall software there is today. Some do not value the firewalls and their use until such issues arise, but just like the war on terrorism, it would be best to take on security measures before they occur to avoid bigger problems once their mischief succeeds.

Filed Under: IT Security Basics, Network Security, Operating Systems, Physical Security, Programming, Real-World Issues, Security Policies, Wireless Security Tagged With: IT Security Basics, Network Security, Operating Systems, Physical Security, Programming, Real-World Issues, Security Policies, Wireless Security

MajorGeek.com: A Download Site for Computer Care

8 January 2007 By Saran

Major Geek

Day-in and Day-out, people surf the web for possible downloads in the form of drivers, security stand alone cleaners, and free programs that will help them in their specific needs. One drawback is the potent threats and reliability of such sites since everyone is aware that such malicious Spyware or Trojans may be present in these programs which are usually compressed in zip files prior to free downloading.

Majorgeeks.com is one site that contains a lot of the helpful tools to aid computer users in their everyday issues and improvements for their overall operating system and performance. One notable thing that most users are aware about is that of intrusions in their system from the usual cookies and attachments that people get from the Internet. With the mischief going around, no one really knows how safe their computer is and what files are needed and not on their hard drives.

Filed Under: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips Tagged With: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips

The Bearing of an Internet Gateway’s Malfunction or Breakdown

4 January 2007 By Saran

Broken Chain in the Web

A lot of people have probably heard about now about the earthquake that hit Taiwan during the holiday break. While the natural disaster caused a lot of discomfort to the Taiwanese community, the world has suffered as well in terms of Internet connection speed.

Taiwan is among the chains or gateways to which the Internet also passes through. Similar to that of a hose that allows water to pass through from one point to another; one hole in it will lower the pressure of the amount of water that should be traveling. In the same way, the underground cables to which help transmit Internet connections from one point to another were damaged and thus today, many are experiencing lousy connection speeds. This has thoroughly disrupted the flow of operations, becoming a discomfort that has left surfers and professionals totally helpless.

Natural disasters are hard to predict. The best that technology personnel can do is come up with better cable durability, but this is no promise for disruptions as we are experiencing today. Among the millions that have been damaged by this untimely event, technology based companies and organizations are surely suffering the most for the gapping whole in the entire connection the web provides.

[tags]internet, gateway, connection, fiber optic, cabling[/tags]

Filed Under: Network Security, News, Operating Systems, Physical Security, Real-World Issues, Wireless Security Tagged With: cabling, connection, fiber-optic, gateway, internet, Network Security, News, Operating Systems, Physical Security, Real-World Issues, Wireless Security

How to Implement Server Security Policies and Access

29 December 2006 By Saran

Security Policies

More and more companies have geared towards technology as far as using it to aid their daily operations and storing transactions for records of individual transactions. Most users are given certain privileges and rights for access towards the main server that holds the programs altogether. User policies and access are defined and declared, so that each can have specific access and user restrictions to avoid any discrepancies and problems that may occur. Such would only be natural for technology relying companies, since developed and installed programs would usually be prone to modifications and debugging along the way.

It is the duty of the appointed administrator in close relation with department heads to determine the level of access to provide to the users who will be using the system. Levels are meant to define with regards to finding up to which level access will be granted to most users who will be inputting and referring data into the system. Besides, access levels and security policies are a good way to safeguard information and avoid eventual sabotage for the entire systems in unlikely situations both internally and externally.

Filed Under: Network Security, Operating Systems, Programming, Security Policies, Tips Tagged With: Network Security, Operating Systems, Programming, Security Policies, Tips

Why Users Should Change Their Password Regularly

27 December 2006 By Saran

Password Theft

Anyone would often be advised to regularly change his password in any access points such as e-mails, log on servers and websites. Reason for this is to increase the need for security as far as gaining access and safeguarding files and pertinent information that is usually stored.

With the large number of hackers that have been cropping up one by one, various means to steal passwords,also known as phishing, or hack accounts have been their main course of action. While some would disregard such acts, the real pain begins once important messages, attachments and relevant information are tampered. True that some would not need to change passwords regularly, but just to be on the safe side, it is best to maintain a regular schedule of updating password security and make it a combination of numbers and letters to establish a more secure and harder way of being cracked or accessed by anyone today.

[tags]password theft, passwords, hacking, cracks, codes, security[/tags]

Filed Under: Cryptography, IT Security Basics, Network Security, Programming, Real-World Issues, Security Policies Tagged With: codes, cracks, Cryptography, hacking, IT Security Basics, Network Security, password-theft, passwords, Programming, Real-World Issues, security, Security Policies

Newer Posts
Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security