Monday, August 25th, 2008
Traditionally, the area of information security has been purely defensive. Classic examples of the defensive mechanisms used in order to protect communication networks include firewalls, encryption and IDS (Intrusion Detection Systems). The strategy follows the classical security paradigm of "Protect, Detect and React.” In other words, try to protect the ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Thursday, August 7th, 2008
One of the worst privacy invaders the world has ever seen is the Internet. When you surf, Web sites can find out where you've been and can gather other information about you. Trojan horses and spyware can snoop on you. Key loggers can capture your keystrokes as you type. Eavesdroppers ...
Posted in Hardware, Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Monday, August 4th, 2008
Good news: the perpetual price drops in the DRAM industry are back again, according to an alert issued Monday by analyst firm iSuppli.The report was targeted at OEMs, iSuppli's clients, but the news actually benefits consumers: after a mild recovery in the second quartr, prices are expected to drop in ...
Posted in Hardware | No Comments
Monday, August 4th, 2008
Most of the major security suite vendors release their new editions in the fall, but some run ahead or behind the rest of the pack. With the release of Kaspersky Internet Security 2009 the fall flood of security suites has officially begun. I'm working on two other suites right now, ...
Posted in General BS, Hardware, Linux, Software, Windows | No Comments
Monday, August 4th, 2008
JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments