Tech Zone

Page 19

Why can’t I access the DSN I just created?

The switch to 64 bit was an essential step for computing; however, the bliss of having the extra addressing space was not all that we got unfortunately. The mixture of 32 bit and 64 bit environments has been a source of headaches for quite a while as demonstrated by the popularity of my other post […]

Continue reading

Patching Season?

The holidays are coming with a large number of security updates releases from vendors. So far this month we already have the following important updates: Google Chrome version 8.0.552.215 was released on 2nd December with 13 security fixes, 4 of them high severity level Apple QuickTime version 7.6.9 is available from 7th December. It contains […]

Continue reading

Why being Proactive in Security is Essential

We have always been taught that once your system is compromised you need to either restore a clean backup or re-install the system in order to be safe. This is because the person who compromised the machine might have installed rootkits, backdoors or tampered with system tools to gain future access to the machine or […]

Continue reading

5 Popular Hacking Techniques – Do you know your enemies? (Part 2)

Welcome back. In part one, we explained the importance of understanding the threats against your network and looked at three common hacking techniques that the bad guys might use against you. They included Attacking Defaults, SQL Injection, and Exploiting Unpatched Services. Now, let’s look at two more, and finish up with some good advice.

Continue reading

5 Popular Hacking Techniques – Do you know your enemies?

“Know your enemy and know yourself and you can fight a hundred battles without disaster.” – Sun Tzu While the famous Chinese general may not have had hacking techniques in mind when he penned The Art of War some 2500 years ago, there is great merit in knowing your enemy, and the techniques s/he may […]

Continue reading

5 Benefits of Automating Patch Management

In a previous article I wrote about software patches and why relying on auto updating systems of individual applications is not a practical solution for corporate networks. You need a patch management solution for proper patch management. But what are the benefits of automating patch management for these companies?

Continue reading

8 Steps to Securing a Public Machine

Mohammed S Ali, wrote an interesting article about the dangers of using public PCs, so to continue with the topic I’ll be explaining what you need to do to secure a machine for public use. 1. Physical Security The first step in securing a public machine is a tricky one and that is ensuring its […]

Continue reading

Cyber Warfare – Fear is the Real Threat

Lately cyber warfare has become a popular phrase. I’ve come across reports and news items stressing the importance of protecting ourselves against this vicious threat; however, such coined phrases often make the situation sound worse than it is.

Continue reading

Why FAX is still an essential element in corporate environments

Germany is one of the leading countries where fax software in general has been established successfully and is still recognized as essential equipment for running a corporate business. Sending a fax is easy, fast and very cheap. But the great thing is that fax reports in general have been acknowledged by some major courts in […]

Continue reading

5 tips for identifying signs of malware

We all know what a big hassle a malware infection can be. By identifying the symptoms of the malware infection and the means available to clean malware on your PC you can restore the machine to a stable state and also safe-guard it from any future malware attacks. The following 5 recommendations should go a […]

Continue reading

Find us on Facebook

Follow us on Twitter