Accessing your accounts in public Wi-fi spots such as Airports and hotels has become more riskier with the launch of Firesheep. Continue reading “Firesheep is available”
A Data Center View
When an enterprise is small in size the IT infrastructure consists of a server room with couple of low end servers, some networking devices and client PCs. But as the organization grows the IT infrastructure too grows in size. Medium to large scale enterprises have data centers of their own or outsource the data center (DC) operations to service providers who specialize in DC operations. In this article, let us have a peek into a typical data center and look at what components are deployed.
Major security bug fixed in Firefox
Auditing System Impact on Performance – Windows
A lot of questions are raised regarding the effect of auditing on the performance of systems.
Continue reading “Auditing System Impact on Performance – Windows”
Theft of information and electronic data overtakes physical theft
According to the latest edition of the Kroll Annual Global Fraud Report, theft of information and electronic data at global companies has overtaken physical theft of property and goods for the first time.
Continue reading “Theft of information and electronic data overtakes physical theft”
Display power point slides from your smartphone on a client’s video projector wirefree!!
Wi-Fi Direct makes it happen!!
Wi-Fi Direct, formerly known as Wi-Fi Peer-to-Peer, is a set of software protocols that allow Wi-Fi devices to talk to each other without the need for wireless access points (hot spots).
Tech Demystified: Blade Servers – The Cutting Edge
Business Model for Information Security – What is it all about?
The role of information security has not been clearly defined in many organizations and these organizations face challenges such as lack of senior management’s commitment to information security initiatives, poor security planning, integration issues between business goals and information security, issues relating to accountability for implementing, monitoring and reporting on information security and so on. Continue reading “Business Model for Information Security – What is it all about?”
Mummy … my hard drive crashed !!
In my previous article, I had covered some tips on shock-proofing ourselves against the loss of our mobile phones. In this article, we shall look at some tips to ensure that when the hard-drive of your laptop / PC crashes, the loss is only of a computing resource and not of your data.
Firewall Types
A firewall is a set of related programs located at a network gateway server that protects the resources of a private network from users on other networks. There are several types of firewalls used in the past and being used today based on their performance, technology, requirement, and level of security. Below here are most commonly used types of firewalls in the industry: