Wednesday, August 20th, 2008
Although Windows XP was Microsoft's preferred desktop operating system for an unprecedented length of time, it became something of a PR nightmare for the software giant. Windows XP is full of security holes and is very easy to compromise. When Microsoft created Windows Vista, its primary goal was to address ...
Posted in Internet, Networking, Security, Windows | No Comments
Thursday, August 7th, 2008
One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your keystrokes as you type. Eavesdroppers ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Monday, July 14th, 2008
FWAuto (Firewall Rulebase Automation) is a Perl script and should work on any system with Perl installed. Provide the running config of a PIX firewall to fwauto. It will analyze and give you a list of weak rules in your rule base and store the result in multiple output files.
Maybe ...
Posted in Internet, Privacy, Security, Software | No Comments
Monday, June 30th, 2008
"By default, Radmin uses a known port, TCP port 4899 for remote access. In addition, if you are using password authentication only, a remote user only has to find an open TCP port 4899 and guess one word: your password.Suggestions:It is very easy to implement any or all of the ...
Posted in Internet, Security | No Comments
Monday, June 23rd, 2008
Everyone knows that there's no such thing as 100% security, but it's unlikely that most businesses realize how insecure they really are. New research on endpoint security shows just how vulnerable corporate networks are.
Eighty-one percent of corporate endpoints probed by IT security and control product vendor Sophos failed basic security ...
Posted in Hardware, Internet, Networking, Privacy, Security, Software | No Comments
Page 3 of 10«12345...10...»Last »