Register Advertise with usHelp Desk Today's Posts Search

Unread

Secure Mobile Communication: How To Shield A Secret

Posted 3rd June 2013 at 03:46 AM by MobiDev




Communication is an essential part of business; corporate privacy is an obligatory work condition. If we combine these two notions, we'll get an ever acute issue in the world of business - secure communication. Security does not depend on the size of your enterprise; neither does on the industry you are in. Security is a general must, and it's hard to argue.


Online has always had a...
MobiDev's Avatar
HyperActive Warrior
Views 668 Comments 0 Go to first new comment MobiDev is offline
Unread

Protecting Your Website from Hackers

Posted 26th March 2013 at 05:28 PM by centurion81 (Lean & Mean Internet Marketing)

Protect Your Website From Hackers

One of the biggest hacking epidemics is related to Viagra and other related websites.

Why do they do this?

These products can't be promoted through regular channels. And building links for them is even more difficult. Hacking unprotected websites is often much less work.

You can utilize standard website and server security protocol. However this post is about spotting the issue early.

You...
centurion81's Avatar
Andrew Hiddleston
Views 753 Comments 0 Go to first new comment centurion81 is offline
Unread

War drive: Real life horror story

Posted 10th August 2012 at 07:52 PM by Rich Nester

As part of a project I was completing in Computer Security I thought I would target war-driving.

For those who do not know what war-driving is - it is essentially the process of using off-the-shelf computing equipment to identify unsecured or poorly secured networks to exploit for free bandwidth or to access.

I thought the most practical way of gaining data was to simply walk from one end of a street to the other end, using my modest Blackberry mobile phone to scan...
Technicate.
Views 760 Comments 0 Go to first new comment Rich Nester is offline
Unread

Social Networks Creating a Breach in Security?

Posted 25th February 2011 at 03:38 PM by mbhrad (Mighty Mike's "WISE"cracks)

View Original: Michael Bhrad Social Media Consulting

Social Networks act as facilitators of our simulated self's online. Not a virtual identity, but an extension of our real identities. So what happens when we extend our personal lives into a scope that may leave us visible in ways we'd never sign-up for to begin with?

Foursquare Security breach unlocked by proactive hacker: Foursquare Safety Issues?

Foursquare is one of the more controversial social...
mbhrad's Avatar
SEO Consultant Bay Area
Views 935 Comments 0 Go to first new comment mbhrad is offline
Unread

Conficker Worm to Activate on April Fool’s Day

Posted 24th March 2009 at 04:33 PM by Chris Monty

The Conficker C worm is no joke.

As we have discussed here before, the worm is spreading fast - it’s already infected between 5 million and 10 million computers. Microsoft is even offering a $250,000 reward to anyone who can stop it.

Now, a group of anti-worm researchers have teamed up to form a group they call the Conficker Cabal. The group is attempting to hunt down the malicious program’s creator and looking for ways to do damage control.

“We love...
Chris Monty's Avatar
I'd Rather Be Blogging
Posted in Uncategorized
Views 1079 Comments 0 Go to first new comment Chris Monty is offline


All times are GMT -6. The time now is 09:34 PM.