Article on the subject of "system security"
-
The 3 most popular attacks targeting clouds today
both the security capabilities of the cloud platforms are becoming more and more complete, but not without vulnerabilities.
-
Apple announced a new, more diverse level of security bug detection bonus
apple has just announced a new security bug detection money reward program, raising the reward level to $ 1 million.
-
Microsoft Defender ATP will be available on Linux in 2020
for more than 13 years, microsoft defender is still a familiar name for windows users, even on windows 10, and is likely to be linux users soon.
-
What is malware analysis? How are the steps taken?
what is malware analysis? in what situations do we need to conduct malware analysis? how is the malware analysis process implemented?
-
Apple expanded the size of the security bug detection program to receive bonuses, including macOS, a maximum bonus of $ 1 million
security researchers have, are, and will find a vulnerability in macos that will be awarded by apple in the near future.
-
Detects many security vulnerabilities in Lenovo server infrastructure
there are a total of 9 different security holes found in lenovo's server infrastructure.
-
Yahoo! attacked, no damage
yahoo! has just confirmed that their server was hacked earlier this week but user data is still safe.
-
List of 26 bootable antivirus CDs for offline scanning
a rescue cd is a useful additional tool provided by antivirus companies to assist in removing difficult malware without booting into windows.
-
Security for web applications
in recent years, e-commerce services (e-commerce) such as online payment, ebanking online transactions ... have developed constantly.
-
Learn about terminal security (endpoint security)
the world of modern information technology brings many benefits but also favorable conditions for bad guys to make use of.
-
'Great technique' Autorun virus removal by hand
first, it must be affirmed, the solution to spread the virus through windows autorun function has many ways. these practices are quite manual, but it helps implementers better understand the security and security principles of the system.
-
How to enable the auto-lock feature when users leave - Dynamic Lock on Windows 10
dynamic lock is one of the new features integrated on windows 10 creators update version. this feature automatically locks the computer every time a user leaves his or her desk. it can be said that this is one of the extremely useful security features on windows 10.
-
How to check Secure Boot has been enabled on your computer or not?
on windows 8 and windows 10 versions, microsoft integrates on a feature system called secure boot, and by default this feature has been activated. the secure boot feature supports security on your system but in some cases you will have to disable this feature to run older versions of windows or
-
Configure the 'brain damage' PIN to log on to Windows 10
on windows 10 is integrated a lot of login options, users can choose, including pin code. if you're using a mobile device, you're probably familiar with pin codes, an authentication solution similar to passwords, but there are some more unique features.
-
4 reasons why Windows UAC is useless
if you have been using windows vista or windows 7, you will probably feel a lot of pain when you have to get the system approval every time you install an application. this feature is called user account control (uac), ...
-
Comodo Internet Security - 'Tightening' system security
with the newly released version, comodo internet security (cis) further enhances two technologies: secure dns and defense +
-
Microsoft was attacked by Syrian Electronic Arm
the syrian electronic army hackers team (sea) promised that they would continue to attack microsoft, and today the team hacked the official microsoft office blog just hours after the web was applied to the new interface.
-
Establish effective cloud security platform with 5 basic steps
according to cso statistics, more than 80% of organizations and businesses have been using services from 2 or more public cloud infrastructure providers, and nearly two-thirds of them that service is using from 3 or more providers.
-
Insider attacks are becoming more and more popular and difficult to detect
internal attacks are becoming more and more popular in recent years.
-
What is cybercrime? How to prevent cybercrime?
we live in an era of internet globalization. the internet invades every corner of the street, is present in every living room and appears in every breath of life. in addition to the obvious benefits, as well as the enormous positive role in the overall development of all humanity, the global
-
What is a security automation system? Are they really necessary?
security automation systems level the playing field by providing advanced threat monitoring and resolution tools to secure your network.
-
Why must India implement security systems for the power sector?
recently, the indian power business association has come to an agreement that it will deploy a comprehensive firewall system, combined with many other security measures.
-
Things to know about an information system security manager
today, due to the actual demand, large it security departments will often need a person to manage the information system security manager.
-
SECURITY SECURITY II: Security Policy Account for Computer Security Account Policies
in the previous section i introduced common methods to protect an organization's computer. in the next part, i will present the specific methods in order, from the process of setting up the system, operating the system based on the safety policies from basic to the advance skills that the admin
-
Overview of building enterprise security detection and response system
security policies of enterprises are usually built through the specific identification of the types of data assets, information needed or play an important role in ensuring the stable performance of the apparatus.
-
Create your own system security weapon
security has been a very hot topic. in order for the computer system to be safe before any threat requires users to research and invest a lot of effort to carefully edit each security parameter in windows. doing that is not easy because no one dares to 'pat the chest' on their own.
-
Learn about terminal security (endpoint security)
the world of modern information technology brings many benefits but also favorable conditions for bad guys to make use of.
-
The basic steps in dealing with network security issues that you need to understand
with the general situation of network security, which is becoming more and more complicated, today, the system security is becoming more urgent than ever.
-
Security for smartphones - how to be absolutely secure?
accompanied by an explosion of support-specific gadgets, there are gaps, shortcomings and vigilance from users.
-
Reasons Why Your Business Needs a Commercial Security System
if you are a business owner, the idea of spending money on security equipment may not sound appealing. but if you want to keep your business and savings safe, then investing in commercial security systems is a must.
-
Comodo Internet Security - 'Tightening' system security
with the newly released version, comodo internet security (cis) further enhances two technologies: secure dns and defense +
-
5 steps to help secure virtual servers
prestigious professionals in the field of virtual system security share advice on security. consider 5 steps when you evaluate virtual system security in your business.
-
ESET Cybersecurity security software for Mac
eset's cybersecurity security application for mac is a nod32 family 'member', consuming a lot of system resources while ensuring the safety of the operating system ...
-
Protect your Ubuntu system
you go to linux because you hear its security is high, virus-free ... it's true.
-
4 security warnings you should not 'ignore'
when you are performing activities on the internet and suddenly a warning is issued from your web browser or operating system, you should take care of it and it is important to act in a timely manner.
-
Winja usage checks the safety of data
winja is a free security software that checks any file, access path, or system to assess the security of files.
-
Enhance security for Mac operating system
on the current situation based on surveys for mac os users, most of them do not have any security methods, and few experienced users can identify those. change in the system. one more thing to note is that many people think the mac os is never infected with viruses or safe &
-
How to scan websites for potential security vulnerabilities with Vega on Kali Linux
resisting a hacker attack is one of the most important responsibilities a system administrator must perform. therefore, it is important for a system administrator to take proactive measures to find and fix vulnerabilities in their websites.
-
Apple does not sell user information!
a study of security scale has shown that apple's ios operating system contains underground tools, allowing governments and other organizations to gather information from iphone, ipad and ipod devices without for known users.
-
How smart home of the super rich is equipped with a terrible security system?
in action films, you must have seen high-end security systems with laser strips across the bulletproof entrance, windows and doors ... and in real life, smart houses of the world. super rich are also equipped with high-end security systems in every corner that is not different from in the film.