AVG Internet Security 2012 |
AVG’s antivirus engine uses four detection techniques: signature, polymorphic, heuristic and behavioural. The last two are similar, both looking at software behaviour to determine whether it’s malicious. |
|
Unravelling the mobile security conundrum |
What do you look for in a mobile phone? As well as the ability to make calls - and no-one really cares about that - the modern smartphone hosts a standard feature set: email, a web browser and multimedia capability. |
|
Three rising cybercrime threats |
Just when you think you've safeguarded yourself from electronic security risks, along comes a new exploit to keep you up at night John Brandon explains three up and coming threats, and how to beat them |
|
2012: the year of the mobile threat |
Smartphones will become more dominant in 2012 and beyond, leaving PC shipments in the dust. That will bring big benefits but also big risks. |
|
DrayTek Vigor 3200n |
A working internet link is crucial to most businesses, so it is sensible to have access to multiple connections. In case of the main DSL wide area network (WAN) crashing, a prepared link will keep the business online. |
|
What the cyberhackers do with your personal information |
When the online shopping store Zappos announced to its customers that names, email addresses, invoices and delivery address as well as phone numbers and the last 4 digits of their credit cards could be exposed in a data leakage in January, it emphasized that “credit card information and important payment data weren’t affected or accessed.” |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
IIS 7.0 : Securing Configuration - Restricting Access to Configuration |
Previous versions of IIS have used a centralized configuration store known as the metabase. IIS 7.0 abandons the metabase in favor of a new configuration system based on a hierarchy of XML configuration files, in order to provide for simpler deployment and more flexible management of the Web server.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Deploying a Public Key Infrastructure with Windows Server 2008 R2 |
The term Public Key Infrastructure (PKI) is often loosely thrown around, but is not often thoroughly explained. PKI, in a nutshell, is the collection of digital certificates, registration authorities, and certificate authorities that verify the validity of each participant in an encrypted network |
|
|
Windows Server 2008 : Using Windows Server Update Services |
In response to the original concerns regarding the difficulty in keeping computers properly patched, Microsoft made available a centralized website called Windows Update to which clients could connect, download security patches, and install those patches. |
|
|
|
|