|
|
|
|
|
.NET Security : The Event Log Service Explained |
In this section, we discuss the overall structure of the ELS and introduce three important elements of its design: event logs, event sources, and events. The principal security aspect of the ELS is as the means to audit Windows security events, for which .NET unfortunately does not provide good support. |
|
|
|
|
|
Hack Your Phone (Part 3) |
When you flash a custom ROM on an Android phone the entire device gets wiped and replaced with the new version you are flashing. When you reboot for the first time it may take a while for the phone to start up, so don’t be alarmed and just leave the phone to do what it needs to. |
|
Hack Your Phone (Part 2) |
The other issue that you should be aware of is that a rooted phone will no longer receive over-the-air updates from the manufacturer. Since custom ROMs based on the updated version will be available almost instantly, however, this won't inconvenience you. |
|
Hack Your Phone (Part 1) - Launcher or ROM |
Flashing a ROM is a pretty straightforward process, although once you’ve been using your device for a while the whole backup and restore procedure for your data can be a pain. If you only want to freshen up the look and feel of your phone then installing a new launcher represents a good compromise. |
|
|
|
|
Security - The Human Element (Part 2) |
Malicious Mail can either put something nasty in your mailbox, delivering the malware straight to you, or lure you to connect to a malicious site or send details that can be exploited. |
|
Security - The Human Element (Part 1) |
It’s shockIngly easy to get many computer users to part with vital secrets such as their passwords and personal details. Time after time, when security professionals test how easy it is to penetrate a corporate system, they demonstrate that the easiest portal is to trick a user into revealing how to access their account. |
|
|
|
Implementing Security in Windows 7 : Set Up Parental Controls |
If your children have computer access, you can protect them from malicious content by setting up parental controls for their computer activities. With parental controls turned on, you can configure times when each child is allowed to use the computer. |
|
Implementing Security in Windows 7 : Lock Your Computer |
Protecting your account with a password prevents someone from logging on to your account, but what happens when you leave your desk? If you remain logged on to the system, any person who sits down at your computer can use it to view and change files. |
|
|
|
Linksys EA4500 Router Review |
EA4500 is the most advanced router in the market of Linksys and it completely deserves that title: high speed, advanced and specific features that don’t appear on any other equipment. However, any product has its own drawbacks and EA4500 is it’s expensive. |
|
|
|
Implementing Security in Windows 7 : Protect an Account with a Password |
You can protect your Windows 7 user account with a password. This is a good idea because otherwise another user can log on to your account just by clicking your user name in the Welcome screen. Once you have a password associated with your user account, another user can still click your user name in the Welcome screen, but that person must then enter your password before Windows 7 goes any further. |
|
|
|
|
|
|
COM+ Security : COM+ Security Explained |
When the current RID master has failed, you need to seize the role and move it to another domain controller. It is important that, after the role has been seized, the original role holder is not brought back online. |
|
Password Hacks (Part 3) - Alternatives to passwords |
A Pass-Window system is also effective. It places a unique key pattern on a transparent section of an identity card. This has to be held over a generated pattern image on a display and, when it is, a series of digits is shown that can then be entered as your single-use password. |
|
Password Hacks (Part 2) - Criminal activity |
The hacking group Anonymous, for example, has been involved in a number of denial-of-service attacks on high profile companies including Master-card and Visa, which was in response to both firms withdrawing support for Wiki-leaks, which had begun publishing 250,000 leaked diplomatic cables. |
|
|
|
|
|