In a Windows XP workgroup environment there might be a need to password protect or restrict access to specific folders. Here is a tip on how to achieve this.
Continue reading “Password protect folders in Windows XP Workgroup environment”
In a Windows XP workgroup environment there might be a need to password protect or restrict access to specific folders. Here is a tip on how to achieve this.
Continue reading “Password protect folders in Windows XP Workgroup environment”
I use the term “hacker attacks” to indicate hacker attacks that are not automated by programs such as viruses, worms, or trojan horse programs. There are various forms that exploit weakneses in security. Many of these may cause loss of service or system crashes.
Cookies are small text files that some websites put on user’s computer to store a variety of information about the user and user preferences. Continue reading “Tech Demystified – Cookies”
Security risks involved in VoIP implementation include denial of service (DoS), service theft, unauthorized call monitoring, call routing manipulation, identity theft and impersonation, among others. Continue reading “Securing VoIP – Part 2 – Technology”
At the CanSecWest security conference held earlier this year, IE, Firefox, Safari & iPhone were taken down within minutes. The fully patched systems went down to remote exploits which only goes to show how insecure internet facing systems are.
Continue reading “IE, Firefox, Safari & iPhone taken down at Pwn2Own”
This final part of the article on SOA security deals about technology involved in securing WSOA (Web SOA) Continue reading “SOA Security – Part 3”
Most of us know that a website is secure if there is a ‘lock’ icon in the browser frame. Let us find out what this lock means and how it enables us to know whether a site is secure. Continue reading “Know the ‘lock’ icon on your browser”
Since 1981, TCP/IP has been built on version 4 of the Internet Protocol. IPv4 was created when the giant, world-wide Internet we take for granted today was just a small experimental network. Considering how much the Internet has grown and changed over the course of two decades, IPv4 has done its job admirably. At the same time, it has been apparent for many years that certain limitations in this venerable protocol would hold back the future growth of both Internet size and services if not addressed. Continue reading “An overview of the new Internet Protocol-IPv6”
Open Web Application Security Project has come out with the top ten web application security risks for the year 2010. The following table makes a comparative analysis between OWASP Top 10 – 2007 & OWASP Top 10 – 2010
Voice over internet protocol is the current trend and technology that people find it easy and economical to use for communication between each other both for personal as well as in corporate world. So what is VoIP exactly and what are the things that comprise a VoIP system and what are the pros and cons of it forms the current discussion . Continue reading “Securing VoIP – Part 1 – An Introduction To VoIP”