Skip to main content

Home/ educational resources/ Group items tagged security

Rss Feed Group items tagged

Daina Peter

Virus Melissa - 0 views

  •  
    Virus Melissa is an extremely communicable security threat that disperses through Word documents especially Word 97, and Word 2000. It replicate very quickly and deletes your important files and data.
Aelicia Doore

SAT Practice Test Overview - 0 views

  •  
    It is a multiple choice questions test and you will have 3 hours and 45 minutes to complete the test including the non-secured questions. * Try to use pencil for solving the paper so that the mistakes could be rectified later.
Alex Parker

8 lessons from McAfee's cybersecurity conference - 1 views

  •  
    Employees and customers discuss security and the future of the firm. McAfee's held its recent annual cybersecurity conference in a Las Vegas casino resort. But there are few places better to learn about risk and reward than the Nevada city.
Alex Parker

7 fixes for this month's Patch Tuesday - 1 views

  •  
    Microsoft looks to update Windows, Office, Exchange and IE, but month is relatively quiet. Microsoft will ship seven security patches as part of this month's Patch Tuesday update next week, three of which are labelled critical. Windows, Office, Exchange and Internet Explorer will all be fixed as part of the update, with December being quieter than the two preceding months.
Alex Parker

February's top stories: Snowstorms cancel US flights, increase in global air traffic - 1 views

  •  
    More than 1,500 flights were cancelled across the US due to bad weather, while Egypt has mandated Libyan airliners flying through its airspace to make a transit stop in eastern Libya to undergo security checks. Airport-technology.com wraps up the key headlines from February 2015.
Alex Parker

Hackers jump on Apple Watch to phish for data - 1 views

  •  
    Hype surrounding smartwatch exploited by cynical scammers. Hackers have jumped on the unveiling of the Apple Watch as a chance to phish for data through social networks, according to the security vendor Malwarebytes.
Alex Parker

£1.2m and a 13% drop in revenue - the cost of a data breach to UK businesses - 1 views

  •  
    News: The £1.2m figure does not include 'hidden costs' - so the figure could be much, much higher. It is widely accepted that a data breach or cyber attack is a 'when' not 'if' scenario for today's businesses. However, new figures from NTT Com Security have highlighted just how important it is for businesses to secure and protect against data breaches.
tech vedic

Data Theft Alert - 0 views

  •  
    Think 100 times before taking help from local PC repair shop, if you once had sensitive files
tech vedic

The Ultimate Guide to Changing Your DNS Server - 0 views

  •  
    In case, you find the need to change the DNS server for your entire network on your router or set it individually on a PC or other device then have a look on this tutorial.
tech vedic

Put your passwords in your pocket and take them everywhere you go - 0 views

  •  
    Now, you can take your password along with you using the portable version of password manager. This program can run on your PC without installation and therefore can be launched from a flash drive.
tech vedic

How to family-proof your PC - 0 views

  •  
    It is important to safeguard your PC against malicious software. You need to resist dodgy downloads, suspicious pop-up and ads.
Alex Parker

5 cybersecurity lessons on reputation, defence and terrorism - 1 views

  •  
    What we learnt from the latest security conference in Amsterdam.
Alex Parker

5 vital lessons from RSA Conference 2015 - 1 views

  •  
    Now the week is over what can you do to improve your security?
Alex Parker

10 exclusive experts' tech-aways on smart cars - 1 views

  •  
    CBR gets expert opinion on smart cars as the industry goes through a wave of partnerships. In last few days car manufacturers have unveiled several partnership ventures with software, chip, and security companies to develop the smart car of tomorrow.
tech vedic

How to check spam communication? - 0 views

  •  
    Spamming is generally unsolicited communication targeted to deceive users with tricky messages from remote locations. However, most of you live in a misconception that spamming is confined only to email service. Such communication may leave you in puzzled state even with the Web-based services like Facebook, Twitter or LinkedIn.
Chiki Smith

Happier and At Peace with Myself - 1 views

I let go of my ex-boyfriend because he is one of those cheating partners who is not contented to have just one girlfriend. He never stopped with his cheating frenzy until I was the one who had enou...

relationships advice

started by Chiki Smith on 02 Jun 11 no follow-up yet
pctechsupport

Trusted PC Tech Support - 1 views

Computers are the most essential commodity for me, especially for my business. That is why whenever I experiences computer trouble, I would really look for a PC tech support specialist to fix my co...

started by pctechsupport on 13 Sep 11 no follow-up yet
Aelicia Doore

Nursing Assistant Program - 0 views

  •  
    As an effective means of hiring the right CNA candidate, there are many local opportunities to find a great free CNA training program by researching hospitals, assisted living facilities, and other long-term care organizations in a local area. In tandem with a local community college, these health care organizations will provide free CNA training as a mutually-beneficial act to keep their facility staffed with the latest CNA trainees who pass the CNA certification exam successfully. Prospective CNAs benefit by getting free training and having a secured job waiting for them after completing their programs, and the health care organization gets a steady stream of the best employees at the same time.
Alex Parker

5 things you need to know about Shellshock - 0 views

  •  
    Experts give us their reactions to the Bash vulnerability in Linux, Unix and Mac. Hundreds of millions of computers are potentially affected by Shellshock, a new bug found in Linux, Unix and Mac. The flaw is related to the command processor called Bash, short for Bourne again shell, which is common to Linux, Unix and Mac systems. So what does this all mean for us?
Alex Parker

Top Five things learned at today's London data centre summit - 1 views

  •  
    Public cloud acceptance by the Enterprise means more not fewer challenges... Today in London Gartner held day one of its two day Data Centre, Infrastrucuture and Operations Management Summit. Here is what we learned this morning: 1) Public cloud acceptance by enterprise means more not fewer challenges 2) Asked if security breaches will slow public cloud adoption the consensus was that the answer was no.
« First ‹ Previous 41 - 60 of 65 Next ›
Showing 20 items per page