Firewall

April 5, 2008
Firewalls are deigned to provide extra security for your computer and the data that is stored on it. Anyone who has a computer runs the risk of data loss and finding a method of data recovery. However, you should not attempt to use data recovery software as soon as this happens as there is a ...

Intrusion Detection Systems – information on IDS and firewalls

März 27, 2008
An intrusion detection system would check all outbound and inbound activity and identify any suspicious move that indicates an attack on the systems from outside which threats a breaking into the system. IDS can be categorized in the following ways. The detection of anomaly or misuse: The IDS gathers some information and compares it to large databases. ...

Public Key Infrastructure – Hacker Safe Infrastructure

März 17, 2008
SSH is a well-known system which allows the use of a remote shell on a secure connection. A secure connection here is one which is authenticated, encrypted and checked for integrity. The encryption stops attackers from being able to read the transmitted data. The authentication helps both the server and the client know that they are ...

Data Recovery

März 16, 2008
While in this modern world where the use of electronic goods mainly the use of computer has been risen to a much large extend. Now every individual knows or has good hands on computer. But as the use of these computers is growing day by day their problems are also rising. The main problem which ...

Data Recovery Measures

März 14, 2008
There are many companies available in the market which provides solutions for Data Recovery. There are basically two types of Data Recovery methods which are being performed by these companies. One method is to locally recover the data by using many of the software available which promises to recover almost all the lost data. And ...

Data Backup for home users

März 12, 2008
For home PC users the main source of data backup is to make the image of their Hard Disk and store it in CD's or DVD's and if needed can restore it from the same. This method is the cheapest and best alternative for the home users to rely on data backup. As the storage capacity ...