Skip to main content

Home/ Information Security/ Group items tagged IT

Rss Feed Group items tagged

Zaid Mark

Fix Error Code 2 - Unable to install applications on your system - 0 views

  •  
    If you are failed to install an application, then you are likely to see error code 2 on your system. Luckily, there is a way out of it. You can fix Error code 2 by implementing the solutions provided in the video embedded below
loadperformance

Application Security in the Software Development Lifecycle Issues, Challenges and Solut... - 0 views

  •  
    This white paper will discuss in detail why application security throughout the entire software development lifecycle is necessary for businesses of all shapes and sizes to prevent web security breaches and how it helps cut down business cost and increase the level of organizational information security.
Zaid Mark

How to enable the F8 key to start Safe Mode in Windows 8 - 0 views

  •  
    Since Windows 8 does not allow users to boot into safe mode or load advanced Startup options by pressing F8, users are finding it difficult in troubleshoot Windows 8. If you are one out of many people looking for a way to enable Advanced Startup Options using F8 key, you have landed on the right webpage.
Zaid Mark

Corrupted System Files Causing Black Screen - 0 views

  •  
    Bumping into a Black Screen, while booting Windows 8 is one of the most reported issues of this operating system. As a matter of fact, this event has a number of preceding sources, and you can recover from it using several troubleshooting methods.
Zaid Mark

Protect Your Windows 8 PC with a Picture Password - 0 views

  •  
    Windows 8 enables you to protect your account with a picture password. The magnetism of a picture password is obvious. Moreover, it may well prove to be a faster means of logging in. Follow this video tutorial to enable picture password.
Zaid Mark

Prerequisites for Updating to Windows 8.1 - 0 views

  •  
    As the manufactures have turned up their sleeves and put forward a fresh piece of operating system, let us get promoted and see what it has to offer. The most expected release of the month was none other than Windows 8.1, earlier called as Windows Blue.
Zaid Mark

How to Manually Remove Recycler/Autorun Virus - 0 views

  •  
    A Recycler folder virus, also named as Autorun virus, is among the known types of computer viruses and is getting common day by day. It has the property to reproduce and distribute itself into the active drives including the external devices.
wolf hesse

Denial of service denial | Science Blog - 3 views

  • However, current filters usually rely on the computer being attacked to check whether or not incoming information requests are legitimate or not. This consumes its resources and in the case of a massive DDoS can compound the problem.
  • The user's computer has to present a filter value for the server to do a quick check. The filter value is a one-time secret that needs to be presented with the pseudo ID. The pseudo ID is also one-time use. Attackers cannot forge either of these values correctly and so attack packets are filtered out.
  • Indeed, the IPACF takes just 6 nanoseconds to reject a non-legitimate information packet associated with the DoS attack.
David Szpunar

Even MORE Metasploit Tutorial Videos! - 0 views

  •  
    Links (by Security Monkey) to extensive Metasploit training videos on SecurityTube by the SecurityTube owner. Excellent ethical-hacker training!
Rich Hintz

Cross often? Make it simple, use NEXUS - 0 views

  • NEXUS is designed to expedite the border clearance process for low risk, pre-approved travellers into Canada and the United States.
Carlos Gomes

IT Controls: How and Where Do You Start? - 0 views

  • As Stephen Katz, former CISO of Citibank, once said, "Controls don't slow the business down; like brakes on a car, controls allow you to go faster."
Carlos Gomes

Companies need to sell security to business-unit execs - Network World - 0 views

  • Stamp says that business units must accept responsibility for the security of the data they generate and control to head off data leaks. "IT people are data custodians, not owners," Stamp says. "We need to transfer responsibility to business people
Carlos Gomes

myNetWatchman - Network Intrusion Detection and Reporting - 0 views

  • Q: What is myNetWatchman? A: myNetWatchman collects, analyzes and reports malicious access attempts to ISPs, who can then take action against the offending machines. [Back to top] Q: How does it work? A: A small client-side application runs as a background application on your system; reading your firewall logs, and creating near-real-time reports that are relayed to the myNetwatchman servers for analysis. [Back to top]
Rich Hintz

Information Technology - 0 views

shared by Rich Hintz on 08 Jan 09 - Cached
  •  
    AICPA's Information Technology Center
Tsudo

Cheat Sheets - PacketLife.net - 2 views

shared by Tsudo on 18 Aug 09 - Cached
  •  
    Good stuff - Thank you
  •  
    My pleasure David. Glad you liked it.
« First ‹ Previous 61 - 80 of 86 Next ›
Showing 20 items per page