WINDOWS VULNERABILITIES AND THREATS
WINDOWS VULNERABILITY OVERVIEW The family of Windows Operating systems supports a wide variety of services, networking methods and technologies. Many
Read moreWINDOWS VULNERABILITY OVERVIEW The family of Windows Operating systems supports a wide variety of services, networking methods and technologies. Many
Read moreAPPLICATIONS OF FIREWALL There are three application of firewall: NAT- There are many ways to implement a firewall, but the
Read moreDATABASE ATTCKS we have list of most critical database attacks, & they are: 1. Excessive privileges: When users (or applications)
Read moreINTRODUCTION Data means groups of information that represent the qualitative or quantitative attributes of a variable or set of variables.Data
Read morePROTECTING YOUR PASSWORD AND LOGGING ON SECURELY Hackers who know your password do not have to resort to technological exploits;
Read moreSOFTWARE SECURITY FOR PORTABLE COMPUTERS The best defense for portable computers is theft prevention, but there are ways to minimize
Read morePROTECTING YOUR COMPUTER AND NETWORK PHYSICALLY SECURING LAPTOP/NOTEBOOK/HANDHELD COMPUTERS Portable computers can be even more vulnerable because it is
Read moreNETWORKING DEVICES Computer networking devices are also called network equipment, Intermediate Systems (IS) or interworking Unit (IWU). Common basic networking
Read moreOSI AND TCP/IP MODEL OSI stands for Open System Interconnection is a reference model that describes how information from a
Read more