PENETRATION TESTING

INTRODUCTION AND METHODOLOGY Penetration testing is the process of attempting to gain access to resources without knowledge of usernames, passwords and other normal means of access. If the focus is on computer resources, then examples of a successful penetration would be obtaining or subverting confidential documents, pricelists, databases and other protected information. Near flawless penetration … Read more

VULNERABILITY ASSESSMENTS

THE CHALLENGES OF VULNERABILITY ASSESSMENTS Network vulnerability assessments are widely recognized as a crucial component of network security and a key component of any overall Network Security Assessment Service. Vulnerability Assessments are performed to determine the actual security posture of a network environment. They are designed to explore whether or not a malicious attacker can … Read more

NETWORK INTRUSION

Computer networks that are currently connected to the Internet are vulnerable to a variety of exploits that can compromise their intended operations. Systems can be subject to Denial of Service Attacks that prevents other computers from connecting to them for their provided service (e.g. web server) or prevent them from connecting to other computers on … Read more

WINDOWS VS. LINUX DESIGN

It is possible that email and browser-based viruses, Trojans and worms are the source of the myth that Windows is attacked more often than Linux. Clearly there are more desktop installations of Windows than Linux. It is certainly possible, if not probable, that Windows desktop software is attacked more often because Windows dominates the desktop. … Read more

BENEFITS OF LINUX

Linux can give you: 1. A modern, very stable, multi-user, multitasking environment on your inexpensive PC hardware, at no (or almost no) monetary cost for the software. Linux is a rich and powerful platform don’t think of it as a “poor people” operating system. Out-of-box Linux has as much capability as MS Windows NT with … Read more

WINDOWS 8 SECURITY

PROTECTING THE CLIENT AGAINST THREATS Microsoft Windows 8 builds on the security features of Windows 7. It enables the enterprise to provide a secure and stable computing platform from which users can accomplish their tasks. Two primary areas are the focus of the Microsoft security approach. Those areas include the following: 1. Protect the client … Read more

CYBER LAWS AND IT ACTS

WHAT IS CYBER LAW? Cyber Law is the law governing cyber space. Cyber space is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. It focuses on enhancing a jurisdiction‘s … Read more

DATA STEALING FROM E-MAIL

HOW TO STEAL DATA FROM AN E-MAIL? Social Engineering. Exploiting the Vulnerabilities in security. Keyloggers and browser monitoring. SOCIAL ENGINEERING- Social engineering is a collection of techniques used to manipulate people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery for information … Read more

MOBILE SAFEGUARDS AND SOLUTIONS

There are some solutions to secure our different types of mobile phones. Since new technologies are coming up we also need to be careful from our side to secure our mobile phones. ANDROID The most important steps you should take to sure your data is secure are: Keeping it private: The easiest way to keep … Read more