<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
		>
<channel>
	<title>Comments on: 5 Popular Hacking Techniques – Do you know your enemies?</title>
	<atom:link href="http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=5-popular-hacking-techniques-enemies</link>
	<description>Brought to you by GFI Software</description>
	<lastBuildDate>Fri, 13 Sep 2013 13:27:20 +0000</lastBuildDate>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
	<item>
		<title>By: Joross_812</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-25422</link>
		<dc:creator>Joross_812</dc:creator>
		<pubDate>Mon, 14 Mar 2011 09:37:04 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-25422</guid>
		<description><![CDATA[Another way of being proactive is to apply Vulnerability Scanning and / or Vulnerability Assessment to your system.

These two methodologies not only identifies possible threats to your hardware and software, it also give suggestions and assess several issues, such as: 

-Are your software patch, virus definitions, drivers, and add-ons updated? 
-Is your computer network secure from online and offline threats? 

Being proactive is a life-saver.]]></description>
		<content:encoded><![CDATA[<p>Another way of being proactive is to apply Vulnerability Scanning and / or Vulnerability Assessment to your system.</p>
<p>These two methodologies not only identifies possible threats to your hardware and software, it also give suggestions and assess several issues, such as: </p>
<p>-Are your software patch, virus definitions, drivers, and add-ons updated?<br />
-Is your computer network secure from online and offline threats? </p>
<p>Being proactive is a life-saver.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: nordie</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-15491</link>
		<dc:creator>nordie</dc:creator>
		<pubDate>Sat, 11 Dec 2010 05:03:12 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-15491</guid>
		<description><![CDATA[@Francesca 

You completely nail it I think. The internet (despite the fact that we all love it) has become this large area of abstract gray that, I think, the world is only now coming to grips about its implication in world politics. The problem is, with the internet changing right before our eyes every single day, it&#039;s hard to really draw boundaries that won&#039;t change the next day. How can you create a cohesive guideline on its use if you don&#039;t really fully know what it does?]]></description>
		<content:encoded><![CDATA[<p>@Francesca </p>
<p>You completely nail it I think. The internet (despite the fact that we all love it) has become this large area of abstract gray that, I think, the world is only now coming to grips about its implication in world politics. The problem is, with the internet changing right before our eyes every single day, it&#8217;s hard to really draw boundaries that won&#8217;t change the next day. How can you create a cohesive guideline on its use if you don&#8217;t really fully know what it does?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Francesca</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-15327</link>
		<dc:creator>Francesca</dc:creator>
		<pubDate>Fri, 10 Dec 2010 04:09:59 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-15327</guid>
		<description><![CDATA[I think this article&#039;s especially apt right now with the Wikileaks attack. With cyber ruffians hitting big businesses like Paypal and Mastercard, you&#039;d be a fool to think that cybercrime is nothing more than petty vandalism. With anyone with an IT  degree being a potential threat, companies now have to worry about every small crack and possible exploit in their area. And it&#039;s up to us folks at the IT dept to find a fix for it.]]></description>
		<content:encoded><![CDATA[<p>I think this article&#8217;s especially apt right now with the Wikileaks attack. With cyber ruffians hitting big businesses like Paypal and Mastercard, you&#8217;d be a fool to think that cybercrime is nothing more than petty vandalism. With anyone with an IT  degree being a potential threat, companies now have to worry about every small crack and possible exploit in their area. And it&#8217;s up to us folks at the IT dept to find a fix for it.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Ito Chow</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-15319</link>
		<dc:creator>Ito Chow</dc:creator>
		<pubDate>Fri, 10 Dec 2010 03:43:22 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-15319</guid>
		<description><![CDATA[The opening quote surely got a chuckle out of me. Not that it&#039;s wrong mind you, but that it&#039;s brutally true. Cyberspace has literally turned into a battlefield of ideas and technology. Not only do you have to know how to defend yourself against cyber attacks, you&#039;ll also have to know what to defend against. It&#039;s a sobering idea actually, using sun tzu&#039;s teachings as a way of learning how to defend against hackers. Though it may sound melodramatic off the bat, this is war after all.]]></description>
		<content:encoded><![CDATA[<p>The opening quote surely got a chuckle out of me. Not that it&#8217;s wrong mind you, but that it&#8217;s brutally true. Cyberspace has literally turned into a battlefield of ideas and technology. Not only do you have to know how to defend yourself against cyber attacks, you&#8217;ll also have to know what to defend against. It&#8217;s a sobering idea actually, using sun tzu&#8217;s teachings as a way of learning how to defend against hackers. Though it may sound melodramatic off the bat, this is war after all.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Sue Walsh</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-14687</link>
		<dc:creator>Sue Walsh</dc:creator>
		<pubDate>Wed, 01 Dec 2010 03:49:29 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-14687</guid>
		<description><![CDATA[Excellent post! It&#039;s really amazing how many people don&#039;t change the defaults on their routers, FTP logins and the like. I know of several small businesses that just won&#039;t install updates or patches and don&#039;t even see the need to update their anti-virus software. They consider it a hassle and feel it&#039;s too time consuming. They think their firewall alone will protect them. I am sure they will eventually learn the hard way.]]></description>
		<content:encoded><![CDATA[<p>Excellent post! It&#8217;s really amazing how many people don&#8217;t change the defaults on their routers, FTP logins and the like. I know of several small businesses that just won&#8217;t install updates or patches and don&#8217;t even see the need to update their anti-virus software. They consider it a hassle and feel it&#8217;s too time consuming. They think their firewall alone will protect them. I am sure they will eventually learn the hard way.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Giselle Borg Olivier</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-14592</link>
		<dc:creator>Giselle Borg Olivier</dc:creator>
		<pubDate>Mon, 29 Nov 2010 14:34:31 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-14592</guid>
		<description><![CDATA[There&#039;s a second part to the blog post. It will be published in the coming days.]]></description>
		<content:encoded><![CDATA[<p>There&#8217;s a second part to the blog post. It will be published in the coming days.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Patrick</title>
		<link>http://www.gfi.com/blog/5-popular-hacking-techniques-enemies/comment-page-1/#comment-14591</link>
		<dc:creator>Patrick</dc:creator>
		<pubDate>Mon, 29 Nov 2010 14:23:16 +0000</pubDate>
		<guid isPermaLink="false">http://www.gfi.com/blog/?p=3040#comment-14591</guid>
		<description><![CDATA[Where are #4 and 5?]]></description>
		<content:encoded><![CDATA[<p>Where are #4 and 5?</p>
]]></content:encoded>
	</item>
</channel>
</rss>

<!-- Performance optimized by W3 Total Cache. Learn more: http://www.w3-edge.com/wordpress-plugins/

 Served from: www.gfi.com @ 2013-09-15 05:59:05 by W3 Total Cache --