This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Thursday, October 15, 2009

Computer Networking Tutorial

1 - Introduction to Networking2 - Networking Basics3 - Network Topology4 - OSI Model Physical Layer5 - OSI Model Data Link Layer6 - OSI Model Network and Transport La...

OSI Reference Model

7 Layers OSI Model Below is another video that give you more information about 7 Layers of OSI Network Model on Cisco Systems. The Understanding the OSI Reference Model by Cisco Systems was presented by Eric Jefferson who did a great job of explaining the 7 Layers OSI Model. ...

OSI Network Layer

7 Layers OSI Model OSI (Open Systems Interconnection) Network Layer Open Systems Interconnection (OSI)Model was developed and defined by the International Standards Organization (ISO). This model was created to define functional communications system in terms of abstraction layers. This reference model is widely used by equipment manufacturers to assure their products inter-operate...

Understanding IPSEC - Server 2003

In this selection from Server 2003 Network Security Admin LearnSmart Video Training, best-selling network security author Tom Carpenter illustrates the foundations of the IPSEC security protocol, as well as IPSEC policies, architecture and troubleshooti...

What is Network Security?

Matt Sarrel technology expert of the Sarrel Group give brief information of what network security is. ...

Information Security Fundamentals

Get a sneak preview of information security concepts presented in E-Learning like threats, risks and business continuity - and gain a feel for the types of security threats you and your organization need to look out for...

Introduction to Information Security

An Information Security overvie...

Monday, June 15, 2009

Do You Want Someone To Know Your Secrets? Protect Yourself with a Firewall

With more and more small and home based businesses getting high speed, full time Internet connections, like Cable modem and DSL, there is an increased need for firewall software and/or hardware. A firewall can be many things, but the main thing you need to know is that without one you are at risk of someone breaking into your computer. With people staying connected to the Internet full time with Cable modems or a DSL line, you are at a MUCH greater risk of someone accessing your computer from a remote location. Basically a firewall limits the access...

Monday, June 1, 2009

How To Protect Your Identity Online

Surfing the Internet is a daily occurrence for an increasing number of people these days, as technology expands and online services continue to grow. Many people go online to carry out banking transactions, shop, check e-mail, and catch up on news. That’s why it’s more important than ever to protect your identity while surfing the web. As identity theft becomes more prevalent, it’s necessary for everyone to be extra vigilant in protecting personal information – before it gets into the wrong hands.Every time you go online and conduct some type of...

Friday, May 22, 2009

How Profits Motivates Virus Creators

The motivation behind hackers has evolved noticeably over the last couple of years. Developing harmful viruses is less about “bragging rights” or satisfying the creator’s ego and is becoming more and more about generating profit or commercial return.The destruction of data on your computer or corruption of programs you use is a common side effect and what people have traditionally associated with a computer virus. The reformatting of your computer “c: drive”, especially at work, and the loss of valuable data used to be an incredibly painful experience.The...

Wednesday, May 20, 2009

How To Recognize Ebay Scams

Shopping and selling on eBay can be one of the most rewarding experiences on the Internet. However you need to be careful of scam artists who will try to take advantage of you through various types of fraud. If you do get scammed on eBay there are ways you can get your money back. However, it is very difficult to ever catch the fraud artist and it is a lot simpler if you can recognize and avoid frauds from the beginning.One of the scams that are very common today is fake e-mails that appear to originate from eBay or PayPal or even your bank. Keep...

Friday, May 15, 2009

How To Shop Safely Online For Any Occasions

Here are several things to keep in mind when shopping online for any special occasions.Pay with a Credit Card and Protect Your Passwords: Credit cards offer you the most protection as a consumer. Never send cash! If you pay by credit card, your transaction is protected by the Fair Credit Billing Act. This limits your liability for any unauthorized chargesto only $50.Understand the Return Policy: Determine the company�s refund and return policies before you place any order. Generally, any item that has been engraved or personalized in any way, will...

Friday, May 1, 2009

10 Steps to Reduce Your Risk of Identity Theft

You've probably heard about identity theft on television or read about it in the newspaper, and you may already be aware of the damage these crimes can cause victims and their families. What you may not know is how to protect yourself from these attacks. Below you'll find ten steps that can help you minimize your chances of becoming another identity theft statistic.Invest in a shredder – Never throw anything away without shredding it first. Identity thieves will dig through dumpsters and trash bags looking for credit card receipts, voided checks,...

Wednesday, April 22, 2009

How Fixing Broken Windows Can Decrease Click Fraud

There is a theory in law enforcement that goes something like this:If someone breaks a window in a building, and it isn't fixed quickly, others will soon be broken. As the evidence of neglect builds, vandals will be more emboldened to break into the building and commit more vandalism and eventually destroy it completely.If, on the other hand, that window is promptly fixed, it discourages further crime because it is clear that someone is watching the store.Further, if instead of just fixing the window, you find the vandal and hold them accountable...

Tuesday, April 21, 2009

How to Prevent Identity Theft

Internet banking is a piece of cake for all those who know how to handle it. Free online bill-payment, the 'next day’ bank to bank funds transfer and much more, are some of its features that make your life so much easier. But, with this bliss you may also invite a serious trouble. One of the worst things that could happen to you is someone using your identity to borrow money from creditors and stealing money from your bank accounts. This is called Identity theft. One would only need two pieces of your personal information to impersonate you: your...

Monday, April 20, 2009

Spyware The Peeping Toms of the Web

While the internet is a great tool for research, or for just keeping in touch with e-mail or looking for a perfect gift, there is an annoying problem that is becoming increasingly dangerous for your computer. While everyone understands what a computer virus does, many people are still relatively unaware of the problem that is Spyware. Spyware is another word for Advertising Supported software (Adware). There are several large media companies that place banner ads and pop-ups on certain web pages in exchange for a portion of the revenue from...

Sunday, April 19, 2009

Top 10 Virus on January 2009

Here are the top 10 Virus/Trojan on January 20081. Windx-MaxtroxDisplay your desktop wallpaper after modified by the virus Windx-Maxtrox.Virus created with Visual Basic has a body the size of the original around 77Kb, without in-pack. The virus is suspected to originate from the strong North Sulawesi has an executable file infection capabilities. Precisely, it will infected program in the Program Files directory. Technical infection canny enough to avoid implementing it detection heuristic antivirus engine. Characteristics that can be recognized...

Thursday, April 9, 2009

Safe and Secure Online Payments with SSL Certificates

The seamless world of the Internet has broken open the physical barriers that existed across regions on the Globe. Today, therefore, you could be sitting in Munich and buying goodies from Seoul. Very convenient, and thrilling. But, when you pay for your goodies and swipe you’re Credit Card, are you sure, you are paying only for what you paid for? Chances are your Credit Card Information traverses through alien territory into the wrong pair of hands. The result, the next morning, you will find your Bank account eroded or emptied? Not a situation...

Wednesday, April 1, 2009

The Home Computer User’s Guide to Spyware

As with the computer virus, spyware can be broken down into a number of different categories. Most users are familiar with the term “adware” which refers to software which serves annoying ads. There are however a number of other spyware variants you should be aware of.To begin with it is important to have a clear definition of spyware. This will also help us understand why the term is commonly used to encompass a number of different variants. Spyware is a program, usually installed without your knowledge, which records what you do on your computer...

Monday, March 30, 2009

Identity Theft – Who is phishing for your information?

There’s a new type of internet piracy called phishing (pronounced fishing). Internet thieves are fishing for your personal information. They’re looking for ways to trick you into giving out your Social Security Number, credit card number and other personal information that they can use to their advantage. You could become a victim of identity theft that could take years to clear your financial history and personal reputation. But understanding how these internet thieves work, will help you to protect yourself from becoming a victim.How do these...

Protecting your self against online credit card fraud

Today more and more people are looking to the internet to do their shopping. With online stores popping up all over the internet the urge to spend money on the World Wide Web has never been stronger. The unfortunate thing is that the urge for scam artists to take your money has never been stronger. So how do you protect your self from these thieves? If you follow these simple steps I promise you’ll enjoy shopping on the internet more having taken these precautions.The first thing you should consider when buying online is if the website you are...

Sunday, March 29, 2009

Your Next PR Nightmare Could Be Only a Click Away

In the age of Enron and failed intelligence, scandals remain the rage of the front page. Companies want to see positive spin and not scandal related material published. Imagine for a moment the educational software site where employees are identified as regular visitors to pornography websites. The effect to such a company’s image could be devastating. Leaks, Peeks & SneaksThere are numerous security risks facing companies with internal networks. Primary among their concerns are stifling leaks and backdoors that allow hackers to penetrate their...

Saturday, March 28, 2009

Don’t Be Bugged - Get Bug Detectors

You are walking along, sweeping back and forth, area after area, searching. You are continuing searching when suddenly a sound begins to click, faster and faster. Is it a Geiger counter? No, it is your bug detector. That is right. If you suspect that someone is listening in on your private conversations, strategic development meetings, covert operations, or whatever your reason for secrecy might be, you can stop it instantly and for good with bug detectors. These handy devices promise you peace of mind and are capable of detecting, locating, and...

Thursday, March 26, 2009

Avoiding Identity Theft

What's in a name? Possibly thousands of dollars. That's the word from law enforcement agents who say that Americans lose millions to identity theft each year. The term "identity theft" refers to a crime in which a person steals your Social Security number or other private information. The criminal then uses that information to charge items or services on your credit or simply steal money from your bank account. The thieves often operate online, making it especially important to take precautions when surfing the Web. A new book called "Geeks On...

Wednesday, March 25, 2009

Where Spyware Lurks on the Internet

Spyware has to be the most talked about PC security threat of 2005. It has now surpassed the computer virus as the No. 1 menace to computer user both at home and in the enterprise. Despite efforts from Microsoft and independent security software companies, the spyware menace is set to continue through 2006 and beyond. The research firm Radicati Group expect worldwide anti-spyware revenue to surpass $1 billion by 2010.There are numerous types of spyware with some more dangerous than others. At one end of the spectrum spyware pushes annoying ads...

Tuesday, March 24, 2009

5 Security Considerations When Coding

1. Input CheckingAlways check user input to be sure that it is what you expected. Make sure it doesn’t contain characters or other data which may be treated in a special way by your program or any programs called by your program.This often involves checking for characters such as quotes, and checking for unusual input characters such as non-alphanumeric characters where a text string is expected. Often, these are a sign of an attack of some kind being attempted.2.Range CheckingAlways check the ranges when copying data, allocating memory or performing...

Monday, March 23, 2009

Background of Password cracking

Passwords to access computer systems are usually stored, in some form, in a database in order for the system to perform password verification. To enhance the privacy of passwords, the stored password verification data is generally produced by applying a one-way function to the password, possibly in combination with other available data. For simplicity of this discussion, when the one-way function does not incorporate a secret key, other than the password, we refer to the one way function employed as a hash and its output as a hashed password. Even...

My Spyware Nightmare, Your Lesson

Have you asked yourself any of these questions lately? 1. Why is my brand new computer slowing down to a crawl? 2. Why is it taking so long to load a basic word processor?3. Why do I have so many popups? Where are they coming from? 4. Why do I keep being sent to places I did not ask to go? 5. Where are these embarassing popups coming from? I never visit sites like that!I did. I was ignorant. I was slow and it cost me a brand new computer. Here is my story.A couple of years ago, we bought a new eMachine for my wife. She had just enrolled in school...

Sunday, March 22, 2009

How to Protect Your Files From a Computer Virus

How safe is your computer? Could you be in danger of getting a virus on your system? Just how real is the danger? What steps should you take if any?While visiting with a one of my students, I became aware that her anti-virus software was over seventeen months old and had never been updated. Upon informing her that she should update her anti-virus software regularly, she was totally surprised. Furthermore she had no concept how essential this was to ensure her system's safety. Therefore I thought it wise to write about some of the precautions you...

Check The Internet Forecast Before You Go Online

According to a recent survey conducted by the Cyber Security Industry Alliance (CSIA), more computer users are becoming increasingly insecure about using the Internet. Forty-eight percent of those surveyed avoid making purchases on the Internet because they are afraid their financial information might be stolen. Fewer than one in five of the 1,150 U.S. adults surveyed believed that existing laws can protect them from fraud, identity theft and other crimes on the Internet. More than two-thirds (70 percent) want Congress to pass stronger data- protection...

‘Spoofing’, ‘Phishing’ and ‘Link Altering’ - Expensive Financial Traps

"Spoofing" or "phishing" frauds attempt to make internet users believe that they are receiving e-mail from a specific, trusted source, or that they are securely connected to a trusted web site, when that’s not the case at all, far from it. Spoofing is generally used as a means to convince individuals to divulge personal or financial information which enables the perpetrators to commit credit card/bank fraud or other forms of identity theft. In "email spoofing" the header of an e-mail appears to originate from someone or somewhere other than the...

14 Household Ways To Protect Your Computer From Viruses

Computer viruses are deadly. They often spread without any apparent contact and can be a nuisance, or even worse, fatal to your computer. Individuals who create these viruses, estimated at 10-15 new ones a day, are the electronic version of terrorists. Their goal is to inflict havoc and destruction on as many people as possible by disabling, stealing, damaging, or destroying computer and information resources. Often, they have no specific target in mind, so no one is safe. If you access the internet, share files or your computer with others,...