Skip to main content

Home/ ACSE Discussion/ Group items tagged security

Rss Feed Group items tagged

Peter McAsh

Errata Security: JavaScript is a real programming language - 4 views

  •  
    Show students this if they complain that JavaScript isn't a real programming language.
Doug Peterson

The Evil that Spyware Can Do | Regillo Consulting Group - 0 views

  •  
    Spyware usually refers to software that is created with the sole purpose of taking partial or complete control of a person's computer without the permission of the owner of the computer. What spyware does is that it uses the resources in your computer to report certain information to someone else that you do not know. Simply put spyware spies on you and on your computer.
Doug Peterson

Google Online Security Blog: Protecting data for the long term with forward secrecy - 0 views

  •  
    Last year we introduced HTTPS by default for Gmail and encrypted search. We're pleased to see that other major communications sites are following suit and deploying HTTPS in one form or another. We are now pushing forward by enabling forward secrecy by default. Most major sites supporting HTTPS operate in a non-forward secret fashion, which runs the risk of retrospective decryption. In other words, an encrypted, unreadable email could be recorded while being delivered to your computer today. In ten years time, when computers are much faster, an adversary could break the server private key and retrospectively decrypt today's email traffic.
tech vedic

The Ultimate Guide to Changing Your DNS Server - 0 views

  •  
    In case, you find the need to change the DNS server for your entire network on your router or set it individually on a PC or other device then have a look on this tutorial.
tech vedic

Put your passwords in your pocket and take them everywhere you go - 0 views

  •  
    Now, you can take your password along with you using the portable version of password manager. This program can run on your PC without installation and therefore can be launched from a flash drive.
tech vedic

How to family-proof your PC - 0 views

  •  
    It is important to safeguard your PC against malicious software. You need to resist dodgy downloads, suspicious pop-up and ads.
tech vedic

How to check spam communication? - 0 views

  •  
    Spamming is generally unsolicited communication targeted to deceive users with tricky messages from remote locations. However, most of you live in a misconception that spamming is confined only to email service. Such communication may leave you in puzzled state even with the Web-based services like Facebook, Twitter or LinkedIn.
Doug Peterson

GpCode ransomware returns, with stronger encryption | ZDNet - 0 views

  •  
    A new version of the dangerous GpCode ransomware has been detected, using RSA-1024 and AES-256 as crypto-algorithms.
Doug Peterson

How to Stay Safe on Public Wi-Fi Networks - 0 views

  •  
    Just because most wireless routers have a firewall to protect you from the internet doesn't mean you're protected from others connected to the same network.
Doug Peterson

Default Password List - Submit - 0 views

  •  
    Default Password List
Doug Peterson

Stuxnet: Anatomy of a Computer Virus on Vimeo - 0 views

  •  
    An infographic dissecting the nature and ramifications of Stuxnet, the first weapon made entirely out of code. This was produced for Australian TV program HungryBeast on Australia's ABC1
Doug Peterson

‪How to choose a strong password - simple tips for better security‬‏ - YouTube - 1 views

  •  
    Sophos's Graham Cluley explains a simple way of creating a complex hard-to-guess password - and how you should never use the same password on different sensitive websites.
Doug Peterson

PrivacyChoice - Making privacy easier - 0 views

  •  
    Your privacy. Your choice. Free tools to make it easier.
Doug Peterson

The Usability of Passwords: /by @baekdal - 0 views

  •  
    Interesting article about passwords and hacking. Special note should be taken about things done on the server side. Read the FAQ located here: http://www.baekdal.com/tips/the-usability-of-passwords-faq as well.
Peter McAsh

The Different Types of Computer Viruses & What They Can Do | Regillo Consulting Group - 1 views

  •  
    Computer viruses are programs which are created with the sole intent of disrupting the operation of a computer. These computer viruses are usually placed into computers without the permission or knowledge of the person who owns the computer.
« First ‹ Previous 61 - 79 of 79
Showing 20 items per page