ITperfection-admin21

About Ali Hassani

This author has not yet filled in any details.
So far Ali Hassani has created 158 blog entries.

Properties of a Strong Password

2020-09-20T09:07:01+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , |

One of the most important ways to ensure that your online interactions are safe and secure is to protect your passwords. Also, the more powerful your password, the harder it is for a hacker to invade your system. A strong password: Is at least 12 characters long Is a combination of uppercase letters, lowercase letters, [...]

Privacy and Security Settings in Safari

2020-09-19T07:11:53+00:00Categories: Web Browsers|Tags: , , , , , , , , , , |

The subject of this post is to review the privacy settings as well as security settings in the Apple Safari web browser. This browser does not offer many settings in these two areas, but this does not mean that this browser is not reliable in terms of security. In fact, most of the security measures [...]

Privacy and Security Settings in Internet Explorer

2020-09-17T12:57:03+00:00Categories: Web Browsers|Tags: , , , , , , , , , , , , , , , , , , , |

The subject of this post is to review the privacy settings as well as security settings in the Internet Explorer 11 web browser. This web browser provides many settings in these two areas for its users, the most important of which we examine.     In Tools menu, click on Delete Browsing History. The [...]

Privacy and Security Settings in Google Chrome

2020-09-16T10:43:20+00:00Categories: Network Security, Web Browsers|Tags: , , , , , , , , , , |

The subject of this post is to review the privacy settings as well as security settings in the popular google chrome web browser. This web browser provides many settings in these two areas for its users, the most important of which we examine. To enter the privacy settings as well as security settings you must: [...]

DMZ Networks

2020-09-22T07:04:01+00:00Categories: Network Security, Networking|Tags: , , , , , , , , , , , , |

The subject of this post is DMZ networks. But what exactly are the DMZ networks? DMZ ((DeMilitarized Zone) is essentially a military and political term meaning a civilian area. The most famous example of a demilitarized zone right now is the demilitarized zone on the border between South Korea and North Korea:   In [...]

5 Backup Software (for Home/Personal Computer)

2020-09-13T12:15:34+00:00Categories: Backup|Tags: , , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to five powerful backup software. All of these applications are suitable for home and personal computers.     Acronis True Image is one of best backup tools. Acronis official website This software has a good desktop interface and working with it is not very complicated. [...]

Watchguard Firewall

2020-09-11T12:44:34+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , |

We have introduced several hardware firewalls on this website so far. In this post also, we intend to do the same. Watchguard is one of the well-known manufacturers of network security products. We have examined several well-known firewalls in the network world. Now it is time to check the firewalls of this manufacturer. Watchguard generally [...]

Go to Top