
ScanPack's word processing system is able to identify documents from specially damaged originals that can easily peel off the print layers of seals, signatures ...

Today (April 15), the world's leading security solutions provider - Symantec has officially announced its strategy to help businesses solve data recovery and system challenges in

Today April 15, 2011, HP Group announced the integration of 3PAR utility storage system into the product portfolio under HP's converged infrastructure solution, the integration to

Cybercrime attacked the information system of state agencies (state agencies) took place. Currently, the Information and Communication Department of the provinces and cities are

On April 21, 2011, IBM held at the IBM 2011 Security Security Symposium in Hanoi. During the conference, IBM mentioned ways to integrate security and security features ...

In the life and work of most of us today requires the use of the Internet, so equipping ourselves with knowledge and security software is essential. Today, we will introduce you

In this series, I will show you some issues in DNS security and how to secure compromised DNS servers.

In the morning of April 23, 2011 in Hanoi, karROX International IT Academy held a meeting with the theme 'White hat hacker - attack & defense'.

If, in the past, the use of Wi-Fi stealing only took up bandwidth to surf the Web, but now with the support of other sophisticated software and eavesdropping methods, bad guys can

On April 25, Trend Micro, the security vendor, launched the latest Vietnamese security version. Worry-Free Business Security 7 has a data loss feature aimed at small and medium

Information about the file 'consolidated.db' on the iPhone records the geographical location and the length of time the user is staying, which worries many people. However, you

These 12 security steps will help you protect your computer, mobile phone or other digital devices safely.

Although USB has become an indispensable thing in anyone's life, these devices also pose a significant challenge to network security.

The hackers' attack on Sony's PlayStation Network (PSN) and Sony Online Entertainment (SOE) has affected a total of over 100 million accounts.

Today, security requirements and requirements, especially for personal data, are becoming more rigorous and demanding. What methods do you usually use to protect the amount of

First of all, to monitor someone's computer means that they can see everything you are doing on your computer at a certain time. It is dangerous if you reveal information about

Viruses, malware, worms, ... are malicious software with your computer. Anyone who has been using a computer knows them or at least has heard about them.

Currently, Kaspersky Security Suite CBE security application has officially got version 11, based on the Kaspersky 2011 engine platform. This name seems quite strange to many

For many computer users, I am very interested and want to know how to turn off the computer (shutdown) or hibernate (hibernate) at a set time. The easiest way to do this is to set

On February 25, 2011, IBM expanded its portfolio of Information Management (IM) software and introduced Watson's computing system in Vietnam market.