Information security

Home/Tag:Information security

8-Steps to Secure Your Computer

2020-09-23T04:09:03+00:00Categories: Computer & Network Concepts, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , |

8-Step to Secure Your Computer Whether you use your computer primarily for work tasks or personal use or both, it’s highly likely you want to keep it and its contents safe and secure. Keeping your computer secure helps you avoid malware and direct hacking attempts designed to steal your personal information. In this post, we’ll [...]

Introduction of Several Encryption Software

2020-09-21T13:29:12+00:00Categories: Network Security|Tags: , , , , , , , , , |

Encryption software is software that uses cryptography to prevent unauthorized access to digital information. We have already discussed the concepts of cryptography in detail in a separate post: Data Encryption. Software encryption uses a cipher to obscure the content into cipher-text. Ciphers are into two categories: Public key (Asymmetric) ciphers: This method uses two different [...]

BitLocker Drive Encryption

2020-09-21T11:10:22+00:00Categories: Network Security|Tags: , , , , , , , , , , , |

BitLocker Drive Encryption is a tool in the Windows operating system for encrypting the entire contents of a drive from a computer hard drive. In this post, we do not intend to discuss the concepts of cryptography. You can read this post to understand these concepts. This tool in Windows 10 is located in the [...]

Privacy and Security Settings in Internet Explorer

2020-09-17T12:57:03+00:00Categories: Web Browsers|Tags: , , , , , , , , , , , , , , , , , , , |

The subject of this post is to review the privacy settings as well as security settings in the Internet Explorer 11 web browser. This web browser provides many settings in these two areas for its users, the most important of which we examine.     In Tools menu, click on Delete Browsing History. The [...]

DMZ Networks

2020-09-22T07:04:01+00:00Categories: Network Security, Networking|Tags: , , , , , , , , , , , , |

The subject of this post is DMZ networks. But what exactly are the DMZ networks? DMZ ((DeMilitarized Zone) is essentially a military and political term meaning a civilian area. The most famous example of a demilitarized zone right now is the demilitarized zone on the border between South Korea and North Korea:   In [...]

5 Backup Software (for Home/Personal Computer)

2020-09-13T12:15:34+00:00Categories: Backup|Tags: , , , , , , , , , , , , , , , , , |

In this post, we are going to introduce you to five powerful backup software. All of these applications are suitable for home and personal computers.     Acronis True Image is one of best backup tools. Acronis official website This software has a good desktop interface and working with it is not very complicated. [...]

Familiarity with Anti-malwares (Home solutions) – Part II

2020-09-26T06:49:12+00:00Categories: Anti-malware & Firewalls, Network Security|Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , |

In the previous post, we reviewed the products of five manufacturers. We now intend to review the products of five other companies. See also: Familiarity with Anti-malwares (Home solutions) - Part I     ESET is a Slovak internet security company that offers anti-virus and firewall products. ESET is headquartered in Bratislava, Slovakia, and [...]

Network Monitoring Tools: Veaam ONE

2020-09-26T09:04:00+00:00Categories: Network Monitoring, Network Security|Tags: , , , , , , , , , |

So far, we have introduced and reviewed several software packages for network monitoring in our posts. In this post, we are going to discuss another powerful software package: Veeam ONE. Veeam ONE, part of Veeam Availability Suite, provides comprehensive monitoring and analytics for your backup, virtual and physical environments. Veeam ONE enables real-time monitoring, business [...]

How to Comply with PCI DSS

2020-09-09T06:59:01+00:00Categories: Network Compliances, Network Security|Tags: , , , , , , , , , , , , , , , , , |

This post presents How to comply with PCI DSS. This article is a summary from of the pcisecuritystandards.org website. With the following link: PCI DSS Quick Reference Guide For more info please refer to pcisecuritystandards.org We recommend you that before continuing, read this post. Each payment card brand maintains its own separate compliance enforcement programs [...]

Go to Top