Skip to main content

Home/ ACSE Discussion/ Group items tagged breaches

Rss Feed Group items tagged

tech vedic

Make your passwords harder to crack - 0 views

  •  
    There's nothing you can do if hackers get into a database with your password in it, but you can still protect yourself for all the other worst-case scenarios involving hacking. First, don't make it easy on hackers by choosing a common password. Splashdata uses security breaches to gather 'most popular passwords' lists each year. The word 'password', number sequences, and other simplistic phrases or numbers fill the top spots. Also, don't use your name, a password related to another one you might have on a different site, or a login name. Instead, experts recommend using 15 characters, upper-case letters, better yet nonsensical words with special characters and numbers inside them. By-The Xpert Crew @ http://techvedic.com
Doug Peterson

Building Secure Web Applications Infographic - 0 views

  •  
    "Neglecting to take proper security measures at the application layer is one of the most common causes of data breaches, yet many companies still leave their applications unprotected. Securing your applications begins with developer training on the risks applications face and the methods required for vulnerability prevention. This infographic focuses on defining these risks and combating common flaws."
tech vedic

How to check USB drives from spreading viruses? - 0 views

  •  
    Sometimes being unaware of the USB virus-or malware-infection, you may put your computer security at stake. The AutoPlay feature of the Windows, executes the file or program stored on your device, without asking for permission, and that may bring havoc on the operating system as well as the confidential data stored on the machine. Thus, you need to disable the AutoPlay feature to deter such security breaching.
Doug Peterson

7 Hottest Hacker Chicks in Internet History | Top 10 Lists & Much More at Ranker - 0 views

  •  
    These 7 computer freaks are a security breach we'd totally let happen. To us. As men. Hacker chicks have got to be the internet's greatest product. Their mix of intelligence, geekiness and sex appeal is a code nobody wants to crack, and the fact that they play with fire makes them that much hotter. So here are the hottest hacker chicks in internet history along with their stories, what they're good at and a few pics of what they look like.
tech vedic

Data Theft Alert - 0 views

  •  
    Think 100 times before taking help from local PC repair shop, if you once had sensitive files
1 - 5 of 5
Showing 20 items per page