When a computer is compromised by an attacker he usually tries to elevate his privileges to that of the administrator or root user. The attacks that can be carried out by administrative users obviously have more far reaching effects and that is what the attacker wants.
Auditing in Solaris
One of the main principles of security is accountability. There are some problems associated with accountability, such as the difficulty in determining the security relevance of each user action. Another problem is searching through the collected data to find meaningful information.
Secure your wireless router before it is too late
Most of us use wireless routers at office and home. While the office routers are generally secured (hopefully), most home routers are provided by broadband operators wih default configurations and passwords. In a worst case it may happen that these are set as unsecured. There is increasing risk of an intruder using an unsecured network or hacking into a home wireless network and sending out malicious mails. Continue reading “Secure your wireless router before it is too late”
Authentication methodologies compared
This article is a continuation of the article ‘Securing information through identification, authentication and authorization’. The table below gives the pros and cons of the various authentication methodologies. Continue reading “Authentication methodologies compared”
Securing information through Identification, Authentication and Authorisation
Authentication is a critical component of the access control mechanisms implemented by organizations to secure information. Underlying principle of logical access control is to identify whether a user is in fact the right person whom he claims to be and provide the right type of access to that person. Continue reading “Securing information through Identification, Authentication and Authorisation”
Data Breach Involving Financial Data
Financial Institutions have always been highly susceptible to data breaches and as per indicators the first half of 2010 has not been any different. Already 39 breaches have been reported by Financial Institutions, and considering that reported breaches form a tip of the iceberg in relation to total breaches, actual breaches are expected to be significantly higher. Continue reading “Data Breach Involving Financial Data”
Qadit moves to a newer and bigger premises
On the strength of the long standing and excellent relationship with our valued clients, associates, ecosystem partners and friends, Qadit Systems and group entities have grown both in terms of service offerings and service quality.
This has necessarily added to another dimension- the quantum of human resources in our fold.
With a view to constantly raising the bar as far as client deliverables go and as a concomitant, providing the right ambience for our human resources to serve you, we have moved to bigger premises supported by state–of- the- art infrastructure at :
1st Floor, Balammal Building (above Canara Bank)
33, Burkit Road, T.Nagar
Chennai 600 017
Phone: 044-42791150 to 52, 6547 7225
Fax: 044-42791149
Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report
The US Government Accountability Office (GAO) did a study on the benefits and risks of moving federal information technology into the cloud and released a report titled ‘Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing’ summarizing it’s findings.
Continue reading “Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report”
Tech Demystified – WiMAX
During the recent BWA auctions, the government has earned a lot of revenue to mitigate a part of its burgeoning fiscal deficit. But very few people know what this technology is and its superiority over the current technologies. So lets have a spot light on this technology. Continue reading “Tech Demystified – WiMAX”
How to connect to a remote PC over internet? – Part 1
You can connect to your work computer from your home computer and have access to all of your programs, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you will see your work computer’s desktop displayed on your home computer, with the same programs running. You will need “Remote Desktop Connection” (RDC). Continue reading “How to connect to a remote PC over internet? – Part 1”
