Soft2Secure

Computer Security Basics. Part 3

Computer Security Basics. Part 3

Rule 8: Privileges and Permissions You can’t break what you can’t touch The next way to protect your computer is to properly use privileges and permissions. That means every computer has an operating system with users having different permission levels built into them. So the main user at any computer is considered to be Administrator, […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Computer Security Basics. Part 2

Computer Security Basics. Part 2

Rule 4: AntiVirus Software – Beware the Wolf in AntiVirus Clothing Yes, of course, updates are nice, but we also need to kill the viruses, to stab’em in the heart and kill’em dead; that is really cool, and that is where antivirus software comes in. Antivirus software is computer software that resides on your computer […]

Read more →

Posted in: KnowledgeBase

Leave a Comment (0) →

Cyber Crime Origin: Russia as a Nursery

Cyber Crime Origin: Russia as a Nursery

The article starts explaining why and how Russia hosts probably the most capacious source of malicious programs worldwide. It’s common knowledge that most of the contemporary computer threats come from countries which do not apply appropriate effort to nip malware developers/releasers. A good or rather the most striking example of such kind is Russia, notorious […]

Read more →

Posted in: News

Leave a Comment (0) →

Target Attacks on Warranties for Fun and Profit

Target Attacks on Warranties for Fun and Profit

This talk is “Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit.” This talk is for people who like unconventional forms of social engineering, who want to learn more about serial numbers and how they’re used to protect products, and people who enjoy finding holes, of course. This isn’t for anyone who works for/with […]

Read more →

Posted in: News

Leave a Comment (0) →

Encryption for Everyone. Part 2

Encryption for Everyone. Part 2

Now we are going to talk about asymmetrical encryption. We were talking about symmetrical encryption, where we’re basically just using a password to protect a file. And that’s really great if Alice and Bob know the password and if they can share it. What if Alice and Bob have never met? They’ve never met, somehow […]

Read more →

Posted in: News

Leave a Comment (0) →
Page 22 of 24 «...102021222324