Most of us use wireless routers at office and home. While the office routers are generally secured (hopefully), most home routers are provided by broadband operators wih default configurations and passwords. In a worst case it may happen that these are set as unsecured. There is increasing risk of an intruder using an unsecured network or hacking into a home wireless network and sending out malicious mails. Continue reading “Secure your wireless router before it is too late”
Authentication methodologies compared
This article is a continuation of the article ‘Securing information through identification, authentication and authorization’. The table below gives the pros and cons of the various authentication methodologies. Continue reading “Authentication methodologies compared”
Securing information through Identification, Authentication and Authorisation
Authentication is a critical component of the access control mechanisms implemented by organizations to secure information. Underlying principle of logical access control is to identify whether a user is in fact the right person whom he claims to be and provide the right type of access to that person. Continue reading “Securing information through Identification, Authentication and Authorisation”
Data Breach Involving Financial Data
Financial Institutions have always been highly susceptible to data breaches and as per indicators the first half of 2010 has not been any different. Already 39 breaches have been reported by Financial Institutions, and considering that reported breaches form a tip of the iceberg in relation to total breaches, actual breaches are expected to be significantly higher. Continue reading “Data Breach Involving Financial Data”
Qadit moves to a newer and bigger premises
On the strength of the long standing and excellent relationship with our valued clients, associates, ecosystem partners and friends, Qadit Systems and group entities have grown both in terms of service offerings and service quality.
This has necessarily added to another dimension- the quantum of human resources in our fold.
With a view to constantly raising the bar as far as client deliverables go and as a concomitant, providing the right ambience for our human resources to serve you, we have moved to bigger premises supported by state–of- the- art infrastructure at :
1st Floor, Balammal Building (above Canara Bank)
33, Burkit Road, T.Nagar
Chennai 600 017
Phone: 044-42791150 to 52, 6547 7225
Fax: 044-42791149
Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report
The US Government Accountability Office (GAO) did a study on the benefits and risks of moving federal information technology into the cloud and released a report titled ‘Governmentwide Guidance Needed to Assist Agencies in Implementing Cloud Computing’ summarizing it’s findings.
Continue reading “Benefits & Risks of moving Federal Information Tech into the Cloud: A GAO Report”
Tech Demystified – WiMAX
During the recent BWA auctions, the government has earned a lot of revenue to mitigate a part of its burgeoning fiscal deficit. But very few people know what this technology is and its superiority over the current technologies. So lets have a spot light on this technology. Continue reading “Tech Demystified – WiMAX”
How to connect to a remote PC over internet? – Part 1
You can connect to your work computer from your home computer and have access to all of your programs, files, and network resources as though you were in front of your computer at work. You can leave programs running at work and when you get home, you will see your work computer’s desktop displayed on your home computer, with the same programs running. You will need “Remote Desktop Connection” (RDC). Continue reading “How to connect to a remote PC over internet? – Part 1”
Password protect folders in Windows XP Workgroup environment
In a Windows XP workgroup environment there might be a need to password protect or restrict access to specific folders. Here is a tip on how to achieve this.
Continue reading “Password protect folders in Windows XP Workgroup environment”
Types of Hacker Attacks
I use the term “hacker attacks” to indicate hacker attacks that are not automated by programs such as viruses, worms, or trojan horse programs. There are various forms that exploit weakneses in security. Many of these may cause loss of service or system crashes.