INTERNET SECURITY

“INTRODUCTION” In order to provide useful services or to allow people to perform tasks more conveniently, computer systems are attached to networks and get interconnected. This resulted in the world-wide collection of local and wide-area networks known as the Internet. Unfortunately, the extended access possibilities also entail increased security risks as it opens additional avenues … Read more

Evolution of Java

java script

“The Evolution of Java” The initial release of Java was nothing short of revolutionary, but it did not mark the end of Java’s era of rapid innovation. Unlike most other software systems that usually settle into a pattern of small, incremental improvements, Java continued to evolve at an explosive pace. Soon after the release of … Read more

DATA BACKUP

“INTRODUCTION” Data backup is said to be the best prevention for data loss. Now the question arise what exactly Backup is? It is a process of having duplicate copy of the original one. It is an activity of copying files or databases so that the data will be preserved in case of any accidentally or … Read more

VIRUS

“VIRUS (VITAL INFORMATION RESOURCES UNDER SEIZE)” A virus is a computer program that executes when an infected program is executed. Therefore only executable files can be infected. On MS-DOS systems, these files usually have the extensions .EXE, .COM, .BAT or .SYS another class of files called overlay files can also be infected. These files often … Read more

MALWARES

“INTRODUCTION TO MALWARES” Malware is a collective term for any malicious software which enters system without authorization of user of the system. The term is created from merging the words  malicious‘ and  software‘.Malware is a very big threat in today‘s computing world. It continues to grow in volume and evolve in complexity. As more and … Read more

VPN THREATS

“VPN THREATS” HACKING ATTACKS- A client machine may become a target of attack, or a staging point for an attack, from within the connecting network. An intruder could exploit bugs or mis-configuration in a client machine, or use other types of hacking tools to launch an attack. These can include VPN hijacking or man-in-the-middle attacks. … Read more

IPSEC VPN and VPN SECURITY ISSUES

“IPSEC VPN” IPSec (Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. Earlier security approaches have inserted security at the application layer of the communications model. IPSec is said to be especially useful for implementing virtual private networks and for remote … Read more

VPN TYPES and VPN TUNNELING

“VPN TYPES” Virtual private network technology is based on the idea of tunneling. VPN tunneling involves establishing and maintaining a logical network connection (that may contain intermediate hops). On this connection, packets constructed in a specific VPN protocol format are encapsulated within some other base or carrier protocol, then transmitted between VPN client and server, … Read more

VIRTUAL PRIVATE NETWORK SECURITY

“INTRODUCTION TO VPN” Tremendous strides in computer networking have increased the productivity of todays workers in todays workplace. The security risk in networking today has also grown. VPN routing uses virtual connections (instead of the traditional dialed line or a leased line) to connect users in remote offices to a private network over a public … Read more

SECURING THE SERVER OPERATING SYSTEM

Most commonly available servers operate on a general-purpose OS. Many security issues can be avoided if the OSs underlying the servers are configured appropriately. Because manufacturers are unaware of each organization‘s security needs, server administrators need to configure new servers to reflect their organizations‘ security requirements and reconfigure them as those requirements change. The practices … Read more