Author Archives: Emmanuel Carabott
Are you providing security for your customers?
Security should not be considered exclusively within the context of one’s organization and environment, it is also important to consider your customers’ access to your systems. We all take things for granted and sometimes do not realise certain shortcomings until …
Why can’t I access the DSN I just created?
The switch to 64 bit was an essential step for computing; however, the bliss of having the extra addressing space was not all that we got unfortunately. The mixture of 32 bit and 64 bit environments has been a source …
Why being Proactive in Security is Essential
We have always been taught that once your system is compromised you need to either restore a clean backup or re-install the system in order to be safe. This is because the person who compromised the machine might have installed …
8 Steps to Securing a Public Machine
Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first …
Why Security Policies Cannot Stand Alone
One important tool in security is without a doubt an effective security policy. A security policy helps to ensure that common procedures across the organization are followed thus facilitating the identification of risks and mitigation of said risks as well …
Cyber Warfare – Fear is the Real Threat
Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.
Best Practices for Patch Management
The first item on an administrator’s to-do list is generally patch management. If done incorrectly patch management can be a risk for the organization instead of a risk mitigator. A few simple best practices however easily eliminate all of these …
7 Ways to Monitor your Local Network
Just as with the internet there is plenty to monitor on your local network too. An effective monitoring system can greatly enhance the security of your network by detecting issues before malicious attackers have time to exploit them and by …
A Look into Insidious Threats – The Logical Bomb
Insidious Threats – Logical Bomb (Emmanuel Carabott) When we think of security we generally get a mental picture of a war against viruses and hackers. The reason for this is that these are by far the most common threats an …
How to create a very strong password
Researchers call for stronger passwords An article on the BBC recently called for people to use stronger passwords in the wake of more computational power available to hackers. We know that security needs to scale as computers become more powerful …










