WINDOWS VULNERABILITIES AND THREATS

WINDOWS VULNERABILITY OVERVIEW The family of Windows Operating systems supports a wide variety of services, networking methods and technologies. Many of these components are implemented as Service Control Programs (SCP) under the control of Service Control Manager (SCM), which runs as Services.exe. Vulnerabilities in these services that implement these Operating System functionalities are one of … Read more

APPLICATIONS OF FIREWALL & FIREWALL EVASION TOOLS

APPLICATIONS OF FIREWALL There are three application of firewall: NAT- There are many ways to implement a firewall, but the most popular for both hardware and software routers is Network Address Translation or NAT. Most inexpensive routers use NAT as the means to share one IP address among many computers. NAT also provides a natural … Read more

FIREWALL

“FIREWALL SECURITY” A firewall is a structure intended to keep a fire from spreading. Buildings have firewalls made of brick walls completely dividing sections of the building. In a car a firewall is the metal wall separating the engine and passenger compartments. Internet firewalls are intended to keep the flames of Internet hell out of … Read more

DATABASE ATTCKS

DATABASE ATTCKS we have list of most critical database attacks, & they are: 1. Excessive privileges: When users (or applications) are granted database privileges that exceed the requirements of their job function, these privileges may be used to gain access to confidential information. For example, a university administrator whose job requires read-only access to student … Read more

DATA SECURITY

INTRODUCTION Data means groups of information that represent the qualitative or quantitative attributes of a variable or set of variables.Data is the raw form of information stored as columns and rows in our databases, network servers and personal computers. This may be a wide range of information from personal files and intellectual property to market … Read more

IT-SECURITY(PASSWORD SECURITY)

PROTECTING YOUR PASSWORD AND LOGGING ON SECURELY Hackers who know your password do not have to resort to technological exploits; they can log on and do anything that you can do on the computer or network. Keeping your password secret is one of the most important things you can do to protect against security breaches. … Read more

IT-SECURITY(PORTABLE DEVICES)

SOFTWARE SECURITY FOR PORTABLE COMPUTERS The best defense for portable computers is theft prevention, but there are ways to minimize the impact if your portable does get stolen. Setting a startup password is a first step, although thieves may be able to defeat this by resetting the password or using a master password that is … Read more

IT-SECURITY(PROTECTING YOUR COMPUTER AND NETWORK)

PROTECTING YOUR COMPUTER AND NETWORK   PHYSICALLY SECURING LAPTOP/NOTEBOOK/HANDHELD COMPUTERS Portable computers can be even more vulnerable because it is so easy to steal the entire computer. A thief might then be able to access the data stored on the hard disk and log on to the organization ̳s network remotely, if additional protective measures … Read more

IT-SECURITY(NETWORKING DEVICES)

NETWORKING DEVICES Computer networking devices are also called network equipment, Intermediate Systems (IS) or interworking Unit (IWU). Common basic networking devices which are very commonly used nowadays are: 1. Repeater – A repeater operates at the physical layer. Its job is to regenerate the signal over the same network before the signal becomes too weak … Read more

IT-SECURITY(OSI AND TCP/IP MODEL)

OSI AND TCP/IP MODEL OSI stands for Open System Interconnection is a reference model that describes how information from a software application in one computer moves through a physical medium to the software application in another computer. OSI consists of seven layers, and each layer performs a particular network function. OSI model was developed by … Read more