Home / IT Security (page 4)

IT Security

Screensavers and Locked Screens

Screensavers and Locked Screens

Screensavers and Locked Screens: In the past, one of the common ways to gain access to a system to simply look around for an unattended system. In many cases, the system would be left logged in and unlocked by a user who was going to step away “for a moment” …

Read More »

Passwords and Physical Security

Passwords and Physical Security

Passwords and Physical Security: Passwords are perhaps one of the best primary lines of defense for an environment. Although not commonly thought of as a protective measure for physical intrusions, they do indeed fulfill this purpose. However, the downside is that unless passwords are carefully and thoughtfully implemented they tend …

Read More »

Scripting Errors

Scripting Errors

Scripting Errors: Web applications, programs, and code such as Common Gateway Interface (CGI), ASP.NET and JavaServer Pages (JSP) are commonly in use in web applications and present their own issues. Vulnerabilities such as a lack of input validation scripts can be a liability. A savvy hacker can use a number …

Read More »

Know What Information Is Available

Know What Information Is Available

Know What Information Is Available About You: If you have Google yourself, you have learned firsthand what is available about you online, but you probably missed a quite a bit. If you have not done so already, try Googling yourself: See what types of information are available, and note that …

Read More »

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More PRIVATE

Pakistani Citizens Information Is Not More Private: The hackers have the complete details of every single individual in Pakistan, their NADRA details, Phone Call Details, Telecom Details, Driving License Details, and if these details go into the wrong hands they can destroy someone innocents life. Behind this all vulnerable Websites, …

Read More »

Tools For Creating Trojans

Tools For Creating Trojans

Tools For Creating Trojans: A wide range of tools exists that are used to take control of a victim’s system and leave behind a gift in the form of a backdoor. This is not an exhaustive list, and newer versions of many of these are released regularly. Let me Rule: …

Read More »

Wireless Encryption Mechanisms

Wireless Encryption Mechanisms

Wireless Encryption Mechanisms: One of the big concerns with wireless networks is the fact that the data is vulnerable when being transmitted over the air. Without proper protection, the transmitted data can be sniffed and captured easily by an attacker. To prevent or at least mitigate these issues, encryption is …

Read More »