alt text

Malicious Code

Malicious Code is a piece of software that can harm your system, you better know what is this .

Malicious Code
alt text

Network Access Control

You must enforce access control for your user, other wise you put your system at high risk condition

Network Access Control
alt text

Tab number #3

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin et felis eget tellus pharetra porttitor. Praesent dui arcu, egestas quis, adipiscing a.

Link #3
alt text

Tab number #4

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin et felis eget tellus pharetra porttitor. Praesent dui arcu, egestas quis, adipiscing a.

Link #4
alt text

Tab number #5

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin et felis eget tellus pharetra porttitor. Praesent dui arcu, egestas quis, adipiscing a.

Link #4
alt text

Tab number #6

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin et felis eget tellus pharetra porttitor. Praesent dui arcu, egestas quis, adipiscing a.

Link #4
alt text

Tab number #7

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin et felis eget tellus pharetra porttitor. Praesent dui arcu, egestas quis, adipiscing a.

Link #4
alt text

Tab number #8

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin et felis eget tellus pharetra porttitor. Praesent dui arcu, egestas quis, adipiscing a.

Link #4



Top Stories

firewall definition and reviews

  • Sunday, January 9, 2011
  • by

  • 1. Introduction
    • A firewall is a system or group of systems that enforces an access control policy between networks
    • Mostly the goal is to protect TCP/IP networks
    • Other possible firewalls: between applications on a windows environment, java card firewalls, etc.
    • Functions:
    Read More...

    Understanding Viruses And Comrades (Virus Variants)

  • Saturday, January 8, 2011
  • by
    1. Understanding Computer Viruses
      A computer virus is a computer program that duplicate or replicate by inserting a copy or copies of itself into the storage media / documents and into the network secretly without the knowledge of computer users. The effects of computer viruses are very diverse ranging from only appear strange messages to damage the computer and delete files or documents we.
    2.  Worm virus Varian Definition, Trojan and Spyware
    Read More...

    Trojan horse tutorial

  • Saturday, January 1, 2011
  • by
  • Trojan horse or Trunyan horse (Troy) , or better known as a Trojan in the computer security refers to a form of suspicious software (malicious software / malware) that can damage a system or network. The purpose of the Trojan was to obtain information  from the target (passwords, user habits recorded in the system log, data, etc.), and control target (gain privileges on the target).
    Trojan different from  other  types of  suspicious software such as computer viruses or worms. because Trojan has the following properties:
    Read More...

    Firewall what, how and why tutorial

  • Sunday, December 19, 2010
  • by
  • A firewall is a system that regulates network services that require an entrance and exit must pass through a wall system. In these systems will be emphasized in coming in from which packets are sent, to which the package was addressed, who sent, how much and the number of the package. In addition to this system requires to pass through firewall also can record all incoming or outgoing service on a network.

    Read More...

    Computer Virus

  • Sunday, December 12, 2010
  • by
  • Virus included in Malicious code. Malicious code is a program that when executed will cause something undesirable in the user. User systems do not usually pay attention to this program to find the damage. This malicious code can cause damage or serious data loss.

    One definition of a virus program is the insert itself to other objects such as executable files and some types of documents that many people use. Besides the ability to replicate themselves, virus can store and perform a specific task. The task can be destroyed or simply displaying something to the screen and the victim could have been assigned to look for a type of file to be sent at random to the internet can even do a format on the hard disk victims.
    Read More...