IT Security Blog

  • Home
  • About IT Security Blog
  • IT Security Basics
  • Real-World Issues
  • Network Security
  • News
  • Malware
  • Tips
  • Spyware

Title tags and descriptions tags: Another look

24 September 2010 By dave

It is definitely the case that search engine optimization is a complicated process. This is in part because of the sheer breadth of the subject, but it is mainly the consequence of the fact that the topic is in continuous motion. Even techniques which have been learned effectively often require further attention. Sometimes this is a case of considering a completely fresh perspective, on other occasions it is updating what is already known. SEO is worth looking at again and again through the different prisms of theory and practice. Insights derived from implementation should be used to inform future theory. The following viewpoint was arrived at by looking at title tags and description tags in a very practical way.

At www.searchengineoptimization.co.uk we keep in touch with the very latest developments in the world of search. This means that our tailored campaigns are tightly focused on meeting relevant targets. [Read more…]

Filed Under: General, Review Tagged With: SEO Companies, SEO Tips

‘Link Hack’ points MySpace users to malicious Phishing site

1 March 2008 By Saran

myspace.jpgTo think the attacks over the internet would end, users of MySpace have been hit by a termed “Link Hack” which was discovered and is being studied by Websense which found the hack to re-direct the parsing process from the MySpace profile page, to the malicious site them back to the said legit page. The hack allows malicious code to be attached to all aspects of the MySpace page (such as the View Pictures, View Profile and other such legitimate functions that are normally used on the social networking site but instead of doing the requested operation, the user is re-directed to another site which prompts the user to click the back button or try to figure out what the hell just happened with the malicious phishing site getting all the info it needs and the cycle continues again and again.

The hijack process comes in stages and all the while the misguided clicks always execute a piece of JavaScript which re-directs the user to a page that seems to be the MySpace site but actually isn’t. The problem has seemingly dropped traffic due to the shutting down by the phishing site. Websense has informed the MySpace people regarding the matter and they are surely taking action to provide measures to ensure the privacy (which may be next to impossible to such open sites) of their subscribers. Symantec has also raised the alarm and has released information that can help users avert the disclosure of personal information to the said phishing site. MySpace has also identified several individuals who might be involved in the attack and have suspended their accounts as they continue to investigate the actions of these errant users and what part they had with the attach on the social networking site.

Filed Under: General, IM, IT Security Basics, Malware, Network Security, News, Real-World Issues, Review, Security Policies Tagged With: Link Hack, Malware, myspace, Social Network Under Attack

Reading Technology Website News

19 March 2007 By Saran

The best way for people to know what the latest threats and mischievous activities that people are up to over the web is to read the websites that specialize as well in network and computer security. There will always be new viruses, spyware and Trojans over the web and while the scope that these sites cover may not be saturated, it also depends on the part of the people on how they are inclined to be aware of such.

News Reading

Unless there is a real outbreak that possesses quite a threat towards every computer, people will not be aware or concerned about technology security today. While the religious practice of keeping track of these threats cannot be readily instilled, it would be best to exhaust all means in being able to do so. Besides, people know for a fact that neglecting such efforts will be at their own risk and network and computer security is something that many would realize when the harm has already been done.

[tags]newspapers, magazines, e-zine, websites[/tags]

Filed Under: IT Security Basics, Malware, Network Security, Programming, Review, Security Policies, Spyware, Tips, Wireless Security Tagged With: e-zine, magazines, newspapers, websites

The Importance of Knowing Filename Extensions Prior to Opening Them

25 February 2007 By Saran

Computer interface with various developed programs and most would have an assigned file name extension tagged to it. There are the usual files that would have a doc, xls, ppt, jpg and bmp file extensions. There are also the compressed files such as zip and amr. The compressed files offer some potential risk since they are usually zipped to group files into one manageable file. Program scripts and installation software are the common contents of these zipped folders to save on space and to make it easier for distribution and transfer.

Filename Extension Genius

It is best to proceed with caution before totally unzipping the contents to any directory of your computer. It is the executable files such as the setup.exe that may garner much doubt. Once executable files are double clicked, it will immediate process and try to install itself on the machine. Once finished, there is no telling what effects it may do or create, thus the need for people to think twice before clicking on the files.

[tags]filename extensions, filenames, zipped, scanning, virus scan, spyware, trojans[/tags]

Filed Under: IT Security Basics, Malware, Operating Systems, Review, Spyware, Storage Tagged With: filename-extensions, filenames, scanning, Spyware, trojans, virus-scan, zipped

The Penetration of LCD Monitors in the Technology Market

14 January 2007 By Saran

The cost for owning LCD monitors today have severely been lowered, putting into peril the usual CRT monitors known as the bulky packaged ones that are usually partnered with a desktop system. While the CRT series have gone as far as widening their screens towards the 19” Flat Screen monitor, from all indications, everyone will be leaning more towards a space consuming and screen optimized LCD monitor regardless of its screen width.

LCD Monitors

Such was forthcoming. In its initial introduction to the market, a lot of people were hesitant due to the astronomical price that it was pegged at. But like all competing products, once the competition sets in, the need to adjust the price to be competitive in the market is a must. Thus, such a trend can be seen with the large drop in the price of LCD monitors such as Samsung and LG Collins, two players who are not really tagged to be in the line of Viewsonic and AOC.

As it stands, the final decision would be left on the price and the screen resolution as required. For people who are simply wanting to get in with the times, this is certainly welcome news for the lower costing manufacturers who aim to satisfy the need for LCD monitors, regardless if this is just for personal satisfaction or not.

[tags]lcd monitors, samsung, lg collins, crt monitors, desktops[/tags]

Filed Under: News, Review Tagged With: crt-monitors, desktops, lcd-monitors, lg-collins, News, Review, samsung

MajorGeek.com: A Download Site for Computer Care

8 January 2007 By Saran

Major Geek

Day-in and Day-out, people surf the web for possible downloads in the form of drivers, security stand alone cleaners, and free programs that will help them in their specific needs. One drawback is the potent threats and reliability of such sites since everyone is aware that such malicious Spyware or Trojans may be present in these programs which are usually compressed in zip files prior to free downloading.

Majorgeeks.com is one site that contains a lot of the helpful tools to aid computer users in their everyday issues and improvements for their overall operating system and performance. One notable thing that most users are aware about is that of intrusions in their system from the usual cookies and attachments that people get from the Internet. With the mischief going around, no one really knows how safe their computer is and what files are needed and not on their hard drives.

Filed Under: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips Tagged With: IT Security Basics, Malware, Network Security, Programming, Review, Spyware, Storage, Tips

Older Posts

Categories

  • Backups
  • Cryptography
  • E-mail
  • Firefox
  • General
  • Google Chrome
  • IM
  • Instant Messaging
  • IT Security Basics
  • Malware
  • Network Security
  • News
  • Operating Systems
  • Physical Security
  • Privacy & Anonymity
  • Programming
  • Real-World Issues
  • Review
  • Security Policies
  • Spyware
  • Storage
  • Tips
  • Web browsers
  • Wireless Security