วันพุธที่ 31 มีนาคม พ.ศ. 2553
Like Cinderella, the password of your friends' Facebook, MySpace, Twitter runescape, Gmail, etc.
http://www.youtube.com/watch?v=RoDSbtRHEeU&hl=en
วันอังคารที่ 30 มีนาคม พ.ศ. 2553
1 / 4: OSI archetypal affection for Cyber Security Act CISA and CISSP candidates
http://www.youtube.com/watch?v=42J3p2VGzcA&hl=en
วันจันทร์ที่ 29 มีนาคม พ.ศ. 2553
Strong Passwords - Customer Friendly Computer Security
Going to an office and look under the computer keyboards and in the end there is a small piece of paper on which the login ID and password. Probably everyone has forgotten the person.
This shows a serious problem with the use of networked computers to the economy. User apathy and arrogance, information security is often combined with the aim of defeating the security policies established.
What happens is that IT security policies clash with usability.Most customers do not follow the policy, were too difficult. A place is IT policies and compliance of users at the time of the collision transfer to a secure computer system. The login screen.
Let us first agree on a definition of a strong password.
From Webopedia, a password that is difficult to recognize the human data and computer programs, effectively protect against unauthorized access. A strong password consists of at least six characters (and characters rather thanThe stronger the password) that a combination of letters, numbers and symbols (@, #, $,%, etc.) are admissible. Passwords are usually case-sensitive, so a strong password contains letters in uppercase and lowercase letters. Strong passwords do not contain the words found in a dictionary or any part of the name.
Customers do not have the passwords difficult. Sorry, just will not! For example, you have two passwords: 1XC% & 27m3 and parrott5. What is the strongest? WhichContinue to use your customers?
The key is education. End users should be educated to the seriousness of computer security and IT security professionals should be aware of the needs of its user base.
You should avoid passwords sequential parrott1, parrott2, parrott3 ... You should use a password that is easy to remember, but not the use of a dictionary. Maybe combine parts of two words with capital letters and numbers.
IT SecurityProfessionals may not like this compromise, but it is better than passwords that are easily broken.
Strong passwords are for the security of computer security, but they are the best way to control access? In the second part we will do our alternatives to passwords.
วันอาทิตย์ที่ 28 มีนาคม พ.ศ. 2553
Eagle Eye - Eagle Pass, Texas - UC San Diego
http://www.youtube.com/watch?v=fAdBjDIWUpM&hl=en
วันเสาร์ที่ 27 มีนาคม พ.ศ. 2553
Cisco CCNA 640-553 Security Secure Network Management
http://www.youtube.com/watch?v=WH25FH05zjc&hl=en
วันศุกร์ที่ 26 มีนาคม พ.ศ. 2553
วันพุธที่ 24 มีนาคม พ.ศ. 2553
President Obama on Cyber Security
http://www.youtube.com/watch?v=wjfzyj4eyQM&hl=en
วันอังคารที่ 23 มีนาคม พ.ศ. 2553
There is no privacy?
http://www.youtube.com/watch?v=s0LYs3Ak-iQ&hl=en
วันจันทร์ที่ 22 มีนาคม พ.ศ. 2553
Protect yourself and your PC - Use Anti-Virus Software
There are very few manufacturers who provide a wide range of security software, virus, worms, malware for the fight against spyware, phishing, software and other threats. Kaspersky Anti-Virus 2009, Norton Antivirus 2009 and BitDefender Anti-Virus 2009 are three of the most commonly used anti-virus available.
Norton Anti-Virus 2009 is not only a platform for anti-virus total, which includes anti-spyware. Norton Anti-Virus 2009 can be set quite easilyIt protects your PC very well. Previous versions of Norton Anti-virus more of a burden on the resources of the PC, so that your PC is slow. The latest version is the inclusion of Norton rave reviews from the faithful, marveling at the ease of use and increase speed.
Kaspersky Labs Anti-Virus 2009 is a full-featured anti-virus and anti-spyware software features that is completely configurable.Kaspersky Anti-Virus 2009 does its job very well and is very easy to use once you have installed. Another advantage is that in previous versions of Norton Anti-virus for comparison, is easy enough for the system resources of the computer. Kaspersky Anti-Virus 2009 is very good in the tests from places like ZDNET observed for anti-virus. Some end-user feedback is that Kaspersky Anti-Virus 2009 can be a complex plant and the lack of an efficient customer serviceDepartment.
Overall, BitDefender Anti-Virus 2009 is a great choice. It does not require much resources in the computer system to run, and does not require most of the end user, all the while offering all the functions and features you need. Their technical support team, either by phone or via chat very accommodating and competent. It 'also a great offer, because it is so convenient, especially considering all the built --Flexibility and functionality you get for the cost.
Remember to protect the best way to obtain private information and your computer is equipped with a full-featured anti-virus, which is supported by a reputable company and go straight a few guidelines to follow to choose the installation.
วันอาทิตย์ที่ 21 มีนาคม พ.ศ. 2553
Home Computer security is vital
It 'important to have the security of home computers for the computer. There are many hackers in the United States and in many other countries that feel the need to hack into other peoples computers and stealing their information illegally.
They may steal your confidential information and corporate resources from your home computer. There are some basic things you can do to make your home PC from harmful threats. To make the first and most important thing toProtect your computer and information from hackers and other potentially dangerous impostor from online threats is to install anti-virus programs on your PC.
Sure they are always running. Do not recognize anything that is suspicious. This security software usually catch the virus or threats before it happens. The computer could crash immediately if a virus has struck. Viruses can interrupt any part of your computerSystem, including your e-mail, programs, or your entire Windows operating system.
It is important to install anti-virus protection software on your computer at home to maintain the security of your PC.
Another important thing to make sure it is turned on and installed a firewall. Normally has an XP operating system, but better can be found free on the Internet. A good firewall is blocking not only block inbound threats, but alsono malicious program sending data packets from the PC.
Some anti-virus or Internet security suite may have a firewall as part of the suite of protective measures. If that activate them, and disable the firewall in Windows XP. There are many hardware firewall for the purchase of software or hardware stores may occur, or as part of a device on the router. They can also be installed next to the firewall software already on your system.
Through moreas a deterrent, security, therefore, provides multiple layers that make it more difficult for the security of your system to penetrate. Place the device no longer an anti-virus software because it can cause lead and / or cause system conflicts and security of PC malfunction.
Another link in the chain of security is to ensure that your Windows runs properly at all times be constantly updated. It 'important to have all / recommended updatesinstalled on your system. Microsoft brings new software and operating system updates on a regular basis to ensure your IT systems secure and running optimally.
To ensure that you do not forget to look for these updates to the Windows operating system is an option that these updates can be installed automatically. In my opinion, and in many cases, this is the best option. The computer download and install updates to the system to a requestperiod of time specified by you. It is possible up to this night while you're in bed, so that they can not interfere with normal computer.
There are many simple steps you can improve safety in the home computer. Make sure that you will take the necessary preventive measures to protect the entire operating system and measures to protect your personal information from hackers, spyware, phishing attacks and virus.
As you can see if you have a PC at home orLaptop computer and use it online, assistance at home, computer security is of vital importance that information confidential to protect and maintain the overall security of systems.
วันเสาร์ที่ 20 มีนาคม พ.ศ. 2553
Accelerating IT application MSCONFIG
http://www.youtube.com/watch?v=a2EVjV9Tqe4&hl=en
วันศุกร์ที่ 19 มีนาคม พ.ศ. 2553
Easier to understand, IP surveillance cameras
Security cameras are the modern solution to ensure security in your home or office. Computer Security cameras are very cheap. For people who have a limited budget and do not want to spend much on security camera, security cameras is a good choice. Most computers, security cameras for home security.
Technically, the sending computer securityImages on a hard drive with a DVR. The problem of computer security camera product varies depending on the camera. Taking up space on your hard drive is one of the most important questions of security camera on your computer. A security camera on your computer hard drive fills up very fast, because it generates lots of files. However, there are ways to reduce this problem. Computer security camera is easy to use than traditionalSystem of video tape.
If you opt for an adequate computer security camera, then you should go for the webcam. Web Cam is both accessible and easy to use. Web-Cam is used for the general supervision of a place. But the disadvantage is that it requires a good lighting conditions. In dim light may be ineffective and webcams offer low quality. But the money is for people conscious Web Cam is a good choice. Of course, with a security camera cheap as less$ 100, you can not expect great performance.
Web-Cam is very easy to install. Who can have a general understanding of the computer has installed a webcam. Web cam installation requires you to connect the device with a USB port, setup and software installation. It takes just minutes to install a web cam. The advantage of the Web cam is, if you are not at home, allows you to scan later in the images. Web-Cam also has a function e-mail alert service can be activated to take over theImages. And, if necessary, you can send photos to the police.
Other types of computer systems security camera IP security camera. IP surveillance cameras provide better picture quality and coverage as a web cam. IP surveillance cameras are also very easy to install. The price varies depending on the degree of coverage and image quality. But you can use IP cameras for less than $ 100 received, too. IP cameras can be accessed from a remote locationInternet. These cameras can be connected to the network and can be accessed from a web browser. Additional IP cameras can be added to the computer if the computer has enough memory.
There are many security cameras on other computers with advanced features. Diese erweiterten Kameras verfügen über viele Funktionen wie Zahlen der Anzahl der Personen, ging in schnellere Ihnen vor Ort oder Geräte, die nach der Bewegung zu haben SchnappschüsseDetector finds a certain movement. These cameras are the creation of many different things to monitor the situation. But these cameras are a web cam and IP network cameras [http://www.sunsecurity.com/ security cameras-c-119.html expensive]
วันพุธที่ 17 มีนาคม พ.ศ. 2553
3 tips for removing spyware from your computer for free
The computer is the portal of the Internet. It allows you to talk with friends via e-mail or Instant Messenger to be able to play the games to educate or even for yourself or your children. However, the computer is at risk the minute you surf the Internet. All kinds of ugly files from spyware, adware, malware on computer viruses are lurking on your computer, all of which are attached to your knowledge. I'll give you three simple tips to follow to allowrepel and remove spyware infections from your computer.
Tip # 1 - My first suggestion is to practice safe browsing techniques. It seems obvious, but one is tempted to visit these Web sites offer downloads and goodies for free. Most of the time they have a price, the infected files in the same area download.
Prevent the spyware file so that you downloaded to your computer first, not only as a legitimate download files or programs from safe andTrusted sites. If you're unsure, then make sure you have the latest browser installed on your computer. Preferably, you should with Firefox, because it can tell you when you visit on a possible "shadow" website.
Tip No. 2 - You should make sure that you are an anti-spyware program that has a guard of content online poll anti-spyware programs, spyware programs are removed to eliminate the serious infections, but this is all that can be removed after the infectionoccurred.
The best way to combat spyware, the amount of infected files, limiting the ability to infiltrate the computer. As this article will help you get rid of spyware free, so I can recommend two products at the time of writing. The first program is Spyware Doctor. The free version does not protect a decent line. [The payment for the version is slightly better, but the free version is] a very good product in itself. The second program is Spyware Terminator.You just need any of those two.
Tip # 3 - My last suggestion, will be held regularly from your computer with any anti-spyware scanning software in use. Be sure to regularly update your anti-spyware definitions for existing file so that the anti-spyware program you can find the latest spyware, published, is to attack your computer.
How do you carry out regular anti-spyware program is, how the computer. Once a week is fineIf you use your computer often, but not to excess. Personally, I use a scan every 2 days when I have my computer every day. My computer is pretty clean.
If you use a Macintosh or Linux-based, it is almost impossible to stop spyware from infecting your computer. However, obtained from the above suggestions can reduce the number of infectious spyware files on your computer's defenses and wreak havoc too.
วันอังคารที่ 16 มีนาคม พ.ศ. 2553
Do-It-Yourself Wireless Home Security
For maximum safety of your home, you should get a wireless, because it gives you all the protection they need, without all the problems of previous versions.
Wireless vs Non-Wireless
Wireless Home Security has many advantages over older systems.
With wireless home security, real estate that is not already an alarm for the effort to make holes in the walls and carpets pulled up to avoid at all cable wiring and installation of otherUnknown components. If you do it, it will also save you time.
Each wireless home security do it yourself "is easy to install, and protects your home like any other security system. Motion detectors placed near the windows and doors, radio waves used for intruders sense. In short, this is to work like most wireless security systems.
Devices that are actually there, even illuminated keyboards that you take with you wherever you go. While it is possible everywhere, the mostrecommended to be placed on the front and rear doors, because they are the most frequent entries and exits. When someone enters the house, leaving a silent alarm. And for a short period, you can insert a code to disarm them. But the intruders do not know, and when the time expires, the system sends the authorities will be informed accordingly.
Wireless home security systems can be purchased almost everywhere.
You can use a wireless security at home "do it yourself, get and set it up yourself,or you still have the option to buy the kit and after him, by traders who know where everything will be able to get the most from your wireless home security ought to be. Obviously you need the system to function properly, otherwise you will just waste of money and they always need a security system.
Because you can take the wireless kit, you should be able to easily control the lithium batteries. Do this regularly, as youto ensure that they function properly.
And because the protection of the family is a priority, this is a must!
วันจันทร์ที่ 15 มีนาคม พ.ศ. 2553
Electoral fraud in 2008 - Corporate Control & Security-vote
http://www.youtube.com/watch?v=wTLD-_-aSjM&hl=en
วันอาทิตย์ที่ 14 มีนาคม พ.ศ. 2553
Free Computer Health Check
The format of the Free PC Tune-up has changed. It is now easier to use and is a great unique site to visit and test your machines health, configuration and performance.
Previously he only works with Internet Explorer because the tests used ActiveX technology, but now can also be used with Mozilla, Firefox, Opera and use a simple plug-in, to Meadco, neptunium, which can run the ActiveX develop other browsers.
Neptune is a free download,Although you must provide your name and e-mail before downloading. Neptune can be downloaded from meadroid.com Please read the page to help ensure that you do not meet all the problems.
Neptune is a very small download of 140Kb, it is not spyware, adware or malware includes all types Once installed, you can test in other browsers with the plugin of Neptune. Sure to use the page as a bookmark for future trials.
Once you are on the page you will find notgrade, the Back button on your browser to use, you must right click and select Back, and this is confirmed by the tests and results at the end. If you use the browser's back button to return to the main page.
To test, click Start Free PC Health Scan - Overdrive. When you register an account yet simple, or you can opt for an account or scroll down the page and run the tests anonymously.
Tests only a few minutes and are 100% secure. You will be prompted to installthe usefulness of scanning, you must agree to carry out the tests after the next time you have the option of an account that is useful for comparison when you create reused.
When you click Create anonymous have an account, then click on "Los geht's!" and then sit back and run the test. Will check the status of the PC, installed software, malware scan, and Drive Performance health. And then run a ping to download and upload Internet CalculateSpeed. If you are at "Almost There!" Hand, the information is optional.
There will also be presented with the results, along with several suggestions to improve your computer performance. Driver Updates are not currently supported, but the driver is a link to each page, allowing you to downlod the latest update manually
วันศุกร์ที่ 12 มีนาคม พ.ศ. 2553
Cold War Computing - The SAGE System
http://www.youtube.com/watch?v=06drBN8nlWg&hl=en
วันพุธที่ 10 มีนาคม พ.ศ. 2553
Digital Security Cameras
Today, digital security cameras are increasingly used in our society, homes and offices. Small in size and easier to install, they give sharper images.
Different models of digital security cameras are available in the market. They include wireless digital security cameras, color digital pen-type mini cameras, security system with indoor and outdoor cameras, security first fas-1248, pelco digital security cameras, and e-mobile-cameras. Wireless digital cameras are smaller, light weight and professional quality devices. They have higher sensitivity and saturation signal. They are powerful and easy to install and operate. Color digital pen-type mini cameras have multifunction software, USB cable, tripod and AAA batteries. Security first fas-1248 cameras have 14 inch black and white monitor with built-in real-time quad processor. Pelco digital security cameras have a compact body style. They have digital signal processing and auto white balance. E-mobile-cameras are digital security camera systems for vehicle, retail or secret use. They store up to 32 digital images. Their typical applications include installation in vehicles such as taxi's, delivery vans, ambulances, police cars or use in small shops and restaurants.
Black and white security cameras are inexpensive cameras that work well in high and low light conditions. Color security cameras are also inexpensive but they work only in general working light. Covert security cameras are so small that they cannot be easily seen. They can be concealed as a different device (such as smoke detector, clock or teddy bear). Day/night security cameras switch from color to black and white depending on lighting levels. They are ideal for variable lighting conditions. High-resolution security cameras have extra light sensors on their digital chips. They increase the effective image quality. These cameras are effective only with high-resolution monitors. Infrared security cameras have their own light source in a light spectrum that can?t be seen by the naked eye. These cameras are good for small areas with no light. Outdoor security cameras have hardened, waterproof outer bodies. Vandal proof security cameras come in hardened cases that can resist the toughest physical abuse.
วันอังคารที่ 9 มีนาคม พ.ศ. 2553
Computer Security - Why it Is Crucial to Backup Now
Most computer users sit and hope every day; simply because they need to backup now. The hope they have is that their computer will not crash because if it did they would lose hundreds if not thousands of files, photos, images, emails, letters and the list goes on - does this situation familiar to you? If yes then you need to backup now to ensure that if the undesired happens you have not lost all those thousands of files and you can save yourself a lot of lost work, a lot of time and a lot of stress. You may now be asking yourself do you need the stress of a backup solution to save the stress that may not occur.
The answer to do you need to backup now is yes, and the correction in the above question is that backing up does not have to be stressful, confusing or complicated and you can now backup your entire data and software in literally the click of a button. This is a reassuring factor for those of use that are not so electronically minded and can speak the geek lingo when it comes to computers and software, but also a benefit to those that can as it will allow you to speed up the backup process, regardless of who you are and what skills you have there is the benefit that you can backup now and it can be easy.
So, now we know why it is needed and how we can do it let`s look at the best software to make things easy when you do backup now. With so many different backup solutions on the market it can be difficult to decide what is best for you, I always believe that it is better to go for a software that you will reap the most benefits from, not necessarily the one that has the most benefits. Personally, a backup solution with endless options, menus and buttons would not benefit me - there would be a vast number of benefits in the software, but not having the ability to use them would prevent me from receiving those benefits - so what do we do in order to be able to backup now and benefit.
วันอาทิตย์ที่ 7 มีนาคม พ.ศ. 2553
Building Security vs Information Security
Most companies hire highly paid computer security professionals who spend hours and hours a day configuring access policies and patching computers. Then they turn around and hire a minimum wage security guards to protect their millions of dollars worth of computer equipment. This isn't even counting intellectual property and their database of customers and names. If a hacker has been hired to hack you which path do you think he will take to steal company secrets? Will he spend months trying to hack the companies' network which has been locked down by the highly paid computer security consultant? Or will he spend a day trying to hack the poorly motivated security guard that is paid minimum wage? Hacking a human (Social Engineering) is the greatest threat to your company. If you don't have someone who can combine computer security with physical security you have no informational security.
Informational security combines every aspect of access control and building management. Informational security ranges from how people access the building , how the janitors dispose of garbage, computer security, staff background checks, staff hiring, video surveillance ect.. A common lapse in physical security is that smokers usually leave one door unlocked during the day so they can take a smoke break. That completely cancels out your hundred thousand dollar key card system. All a information thief would have to do is watch your building for the day and find the smoker hang out.
Every major type of informational theft crime has used some type of social engineering attack. Untrained and poorly paid employees are the easiest targets because they are usually are unmotivated and easily influenced. The key is not paying people more; the key is to train them to know what to look for. A well trained staff member will enjoy their job and take ownership of their responsibilities. They will not want to let the company down if they are trained and feel needed.
Your employee hiring process should include a background check and credit check. If the candidates have ever declared bankruptcy do not hire them. If they are really strapped for cash they can be easily bribed or seduced into selling your companies secrets. The federal government does not give Secret security clearances to people who have declared bankruptcy. Why would you let someone like that near your company's vital data?
Your company's weakest link is your employee's cars and homes. It's easier for a hacker to follow someone home from work and then steal their laptop out of the car. Also, employees usually leave their access cards in their automobiles. Create company policies for storing company laptops, PDA's and access cards in secure locations...not in cars.
Check your company websites!! Don't have every employees name, position, phone number, email address and bios listed on the website. All this information just gives a information thief more tools to work with.
Train your in house security about your computer network. If you train them the very basics about technology and servers they will be more aware about what people should be doing. Train them to look for portal hard drives, key chain drives and writeable media like DVDs and cdroms. All of these items can be used to take vital company secretes off company grounds.
Finally here is the easiest way to protect your company's network......log off your computer when you're done using it. This sounds like a common sense but nobody logs of their computer when there done. The worst culprits are executives, who always want access to everything. If a hacker gets inside your company, it takes less than a minute to install a root kit. Once his root kit is installed your doomed.
วันเสาร์ที่ 6 มีนาคม พ.ศ. 2553
XCACLS, SUNINACL, And Other Permissions Security Recovery Tools
You Have 50GB Of Data To Move Along With Permissions Security
---------------------
This article is about several tools that can save a Windows administrators you know what in the event of a large scale permissions security problem.
Here is a fictional scenario we can use to illustrate the use of the XCACLS tool. We need to move or copy 50GB worth of data that is comprised of several thousand directories containing hundreds of thousands of small files from one storage system to another. These systems happen to part of a Windows 2000 Domain and permissions are quite granular in definition. We start the replication of that data using a favorite replication or synchronization tool and walk away for the evening. When we return the next day, everything has copied and all looks well. That is until you try to access the data.
The Data Is Copied, But I Cannot Access It: Permissions Security Problem
---------------------
What you did not know, until just now, is that the root directory of the drive that you copied the data to had the wrong permissions assigned to it. In addition, inheritance was configured such that any data that is placed on the drive is over written with the permissions of the root directory. In this case, it was an old account that no longer existed. Believe it or not, that can happen, and system administrators will know what I am talking about. Now you are left with trying to figure out what to do. Do I format the new drive, change the permissions and inheritance on the root directory so they are correct and start all over again? Do I make the changes on the root drive so they have the correct permissions and wait hours upon hours for the permissions to propagate? No, there is another, very fast way of resolving this issue with XCACLS or another tool called SUBINACL.
XCALCS Quickly Resets Permissions On Directories And Files
---------------------
Becasue I have limited space in this article, I am going to use XCACLS as the tool to correct this problem. However, in complex permissions structures, you will most likely want to use SUBINACL to fix the issue. I will talk about SUBINACL briefly at the end of the article.
XCACLS as a very fast tool that can set, remove, add, and change permissions on files and directories. For intance, the following command replaces all existing access rights and accounts with that of "dmiller" on the file "file.txt" with read-only access: "xcalcs file.txt /Y /T /G domaindmiller:r". Although that is pretty easy and helpful, what about changing all my directories and files, which I have thousands of, to allow the domaindmiller account to have full access? To do this in a very fast fashion you could execute the following from the root directory of the drive: "for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domaindmiller:f". This will go through every directory, subdirectory, and file and replace the current permissions with dmiller having full access to the object. You'll notice I put "" around the %g in the example. This is not required, but if you have directories that have names with spaces in them you will need to have the "".
What Other Ways Can I Use XCACLS To Change Security Permissions
---------------------
To give you a few additional handy examples of how you can use this tool take a look at the follow command prompt methods for replacing, updating and removing accounts and permissions from large numbers of directories and files.
The following command replaces all existing access rights an accounts with that of dmiller with read only access rights:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G domaindmiller:r
The following command does not replace existing account permissions, instead, it adds the account, in the example the local admin account, with read only permissions:
for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /G administrator:r
The following command removes the account "administrator" permissions from all directories, files, and subdirectories: for /d %g IN (*.*) DO xcacls "%g" /Y /E /T /R administrator
This command should update all the directories and their contents to allow Domain Admins full access:
for /d %g IN (*.*) DO xcacls "%g" /Y /T /G "Domain Admins:f"
I did a test on my XP Pro workstation and was able to change the permissions on approximately 10000 directories and files in less 1 minute. On one of my servers I was able to achieve a 500% increase in speed. It is blazingly fast.
SUBINACL Is More Complex But Man Can It Really Save The Day
---------------------
I cannot go into specifics about this tool in this article but I will tell you what it can do. And again, it does it very very fast. Using the same scenario as above, let's say that you had to fix the permissions on thousands of home directories. With SUBINACL, you can actually go to the original directories and files, use the tool to create what is called a "play file", a text file that contains the right account and permissions from the source files, then use that same file to tell SUBINACL to fix the permissions on the target storage system, the one with the screwed up permissions. It's quite the life saver if you ever find yourself in the type of predicament.
Also check out "CACLS". This command is inherent to Windows XP Professional.
Conclusion
---------------------
These tools are contained in the Windows 2000 and 2003 server resource tool kit, however several of them also exist native to the Windows XP environment. Check them out if you don't already know about them. Even if you have no use for them right now it may save you hours of hard work and stress in the event of a future permissions problem.
You may reprint or publish this article free of charge as long as the bylines are included.
Original URL (The Web version of the article)
---------------------
http://www.defendingthenet.com/NewsLetters/XCACLS-SUBINACL-AndOtherPermissionSecurityRecoveryTools.htm
วันศุกร์ที่ 5 มีนาคม พ.ศ. 2553
The Computer Security Act of 1987 - In Layman's Terms
Are you concerned about computer security? Do you worry that personal and sensitive information could be leaked to someone with the intent to use that information in a negative manner?
What Is It? The Computer Security Act of 1987 was the first true attempt by the government of the United States to legislate information in the federal government's computer systems. The overall goal was to protect and defend any of the sensitive information in the systems and provide security for that information.
Basically, what's private should remain private. The Computer Security Act of 1987 puts a check into place on federal computer systems. And, it's paved the way for the future of the public's limited access to government information.
The National Bureau of Standards, which is now known as the National Institute of Standards and Technology (NIST), was put in control of creating a strategy to develop certain standards for protecting any information. The Computer Security Act of 1987 required the National Bureau of Standards to create an absolute minimum of acceptable security practices.
Under the Computer Security Act of 1987, security plans dealing with computers needed to be created, and people who used those systems needed to be given the correct training.
Why Did the Computer Security Act of 1987 Originate? At one point in time, the United States Congress had concerns about how vulnerable computer databases could be. Could information be leaked? How possible were breaches in security? Could there be a national security threat if any information leaked and fell into the wrong hands?
It was at this time that Congress decided to check into matters and see how vulnerable the government computers really were.
What Does the Computer Security Act of 1987 Do? The Computer Security Act of 1987 created an advisory board, consisting of twelve members, who met a minimum of three times during the year. The board would give their report to Congress, the National Security Council and others.
The government act does prevent sensitive information from being released, but it also forbids the withholding of any information that's requested because of the Freedom of Information Act. And, the Computer Security Act of 1987 does not allow any restrictions, limitations or regulations on the disclosure, collection, sale or use of public domain or privately-owned information.
Outcomes from the Computer Security Act of 1987 As of yet, there haven't been any reports of major information leaks or threats to national security. But, libraries have reported that several government agencies, like NASA, the Department of Energy and the Department of Defense, have not released as many documents to the public as they did before the Computer Security Act of 1987.
Since the Computer Security Act of 1987 was passed, it has now been superseded by the Federal Information Security Management Act of 2002, which expands on the realm of computer and network security.
วันจันทร์ที่ 1 มีนาคม พ.ศ. 2553
Dealing with AV Metasploit
http://www.youtube.com/watch?v=ScTCJ88rplU&hl=en