The Importance of Securing a Linux Web Server
With the significant prevalence of Linux web servers globally, security is often touted as a strength of the platform for such a purpose. However, a Linux based web server is only as secure as its...
View ArticleOracle releases emergency Java update
Oracle Corp. released an emergency update to its Java software for surfing the Web on Sunday, but security experts said the update fails to protect PCs from attack by hackers intent on committing cyber...
View ArticleJava Security Vulnerability – How To Disable Java In Linux Browsers
When the Homeland Security folks get into the mix and urge all computer users to disable Java in their browsers, you know it’s serious. Indeed, the exploit announced yesterday seems to affect all...
View ArticleThe DDoS attack survival guide, 2013 edition
How botnets and application vulnerabilities have made DDoS attacks more damaging than ever before, and what you can do to fight back. Google. Twitter. Government websites. Fortune-500 companies. All...
View ArticlePracticing safe DNS with Google
The Internet’s a dangerous place for an innocent Web browser to be searching alone for the right Web page, so the Domain Name System Security Extensions (DNSSEC) was created to make searching safer....
View ArticleThings that every IT person should know
No book or teacher can magically pour deductive problem-solving skills into your head. What works is lots of experience falling flat on your face — and lots of pounding your head on a desk until you...
View ArticleWhat is the Network Control Point for Security?
In recent years, analyst firms and vendors have all jumped on the bandwagon using the terms Next Generation Firewall (NGFW) and Next Generation IPS (NGIPS). The key to both technologies is application...
View Article75 Open Source Apps To Replace Popular Security Software
While no security software can provide complete protection from every cyberattack, the open source community has developed a variety of tools that home users, small businesses and enterprises can use...
View ArticleFree & Open Source Rootkit and Malware Detection Tools
A lot of sniffers, rootkits, botnets, backdoor shells and malwares are still on the wild today, which are used by malicious attackers after successfully pawning a certain server or any live network in...
View ArticleToo many admins spoil your security
We’ve all known for a long time that unnecessary use of elevated privileges is a bad thing. You shouldn’t be logged in as an administrator while surfing the Internet or checking your email; in...
View Article
More Pages to Explore .....