Category Security

Backdoor

A backdoor is about any method by which user is able to get around regular security measures and get high level access type on a system Backdoor Trojans couldn’t be more appropriately named as they offer the person or group…

Backup

A backup is a copy of the data vital for comprehensive recovery in case of software or hardware failures. There are different backup types including normal, copy, incremental and differential as well as various strategies suitable for certain scenarios.  In…

Cryptography

Information can be protected if it is transformed into a more secure format. In essence, cryptography is the science which allows ordinary information to be transformed into secure information. The process itself is called encryption, and it’s not something that’s…

Dark Web

The dark web (or dark net as it’s sometimes known) is so called because not only is its content not indexed by normal search engines, it’s also encrypted, and that makes it even more inaccessible. It’s a part of the…

DDoS

You might have heard the term “DDoS” thrown around – well, it’s an acronym for an increasingly common security risk: the Distributed Denial of Service attack, where websites are disrupted by means of large networks of bots. Hackers use anything…

Deep Web

The deep web is sometimes known as the invisible web or the hidden web, but whatever you call it, it’s about those hidden parts of the Internet that you can’t reach just by using the usual array of search engines like…

Email Virus Protection

Email antivirus protection is so important because email is one of the main avenues for getting into someone’s computer uninvited. If someone wants to send you a virus, then email is probably going to be the first route they’ll try.…

Encoding

It’s often necessary to convert data from one format to another format. This process is called encoding. You might encode data to save space, to make it easier to process, or for a variety of other reasons. Think, for example…

Firewall

The word Firewall takes its name from the world of architecture, where it means a partition made of fireproof material. In the world of computers and networking, a firewall also helps to stop you getting burned, by keeping outsiders breaking…

sFTP

In today’s cyber security environment you can no longer risk transferring your data across an unencrypted connection. Standard FTP ( File Transfer Protocol ) has been around a long time and does not on its own encrypt data, it’s simply…
Search
Generic filters
Exact matches only
Search in title
Search in content
Search in excerpt