Misc Security

Misc Security

I recently heard that there are viruses out there that can invade your privacy. How can this be related to mobile phones. There are a lot of mobile antiviruses out there and I would like to know their real purpose. Are they really efficient? How potent are mobile viruses and what is at risk on mobile phones?

 

  • 505 views
  • 1 answers
  • 0 votes

When everyone first started going online there was a lot of info about internet safety. Now how do you if you are getting hacked by just going on a website? How do you protect yourself from the identity theft that seems to happen daily? Do you have a realy safe program that you use?

  • 354 views
  • 1 answers
  • 0 votes

Hello, im a programmer currently practicing python programming and my project involved using simplicity from which i wanted to recognize faces, i heard of an algorithm by the name adaboost and i was wondering how i can integrate it into simplicity using engine faces PCA. So i just need a walk over on the steps on how adaboost works

  • 457 views
  • 0 answers
  • 0 votes

What are the best security strategies to use against winlock virus? A system was recently attack by winlock virus which edit the shell and userinit in the system window registry thereby leading to system malfunctioning. In implementing a security measure against winlock virus, what is the major system vulnerability that winlock virus exploit?

  • 511 views
  • 3 answers
  • 0 votes

How possible is it that introducing certificates for mobile app would improve mobile security? Now that anybody can develop mobile app for various reasons and these apps are finding their way to the various app stores, how could introducing client certificate increase the security of mobile devices?

  • 470 views
  • 1 answers
  • 0 votes

How do I make my browsing secure when am using public wi fi connection or networks? I recently found out that hen am in public using public networks (wi fi), window will put my connection in public thereby protecting some of my files, but this protection is really limited because someone was able to access my files while using the same public network. Is there any other ways to increase my privacy while using public networks?

  • 730 views
  • 2 answers
  • 0 votes

Do I need to worry in installing apps on my mobile devices or not? Now that everything is going mobile, a lot of apps requires a lot of access to personal privacy. With many apps requesting free range of mobile permission, should I be concern or just trust that the data are in safe hand? Is there any supervisor for the data that this app developers has access to?

  • 766 views
  • 2 answers
  • 0 votes

Which is better between hardware or software authentication? Now that security is the underlying priority of establishing an Info Tech infrastructure, what approach should a company choose between hardware and software in determining its authentication strategies? What are the diff between the two? In term of cost, which among the two is more economical?

  • 498 views
  • 2 answers
  • 0 votes

How best can security strategies be implemented to allow willingness of users in coping with sometimes complicated security practices? With 2014 a year that record a lot of personal and corporate security breaches, ITs are planning of using complex and sometimes discrete passwords for individual accounts. How can this multilayered security approach improve the overall security of an organization?

  • 430 views
  • 1 answers
  • 0 votes

How best can office 365 be secure efficiently and authentication methods are maintained? Now that the workplace is virtually mobile, securing mobile devices across many networks is increasingly difficult to achieve. What are the advance security options to use in office 365? What tricks and tips are available? How best can two factor authentications be set up?

  • 525 views
  • 1 answers
  • 0 votes

Articles

Blogs

Tips