Prolong the idle time of an established network connection before the session...
By default, Windows 7 suspends an inactive network connection to a shared folder residing on a server after 15 minutes however; you can modify this setting through Group Policy settings. When a session...
View ArticleDisabling Autoplay on Windows computers
The Autoplay feature may pose a security risk on computers running Windows operating systems. The feature enables computers to automatically open and run different types of media when they are inserted...
View ArticleImproving text quality on your screen
The technology known as ClearType font on Windows systems makes text on displays easier to read. It is enabled by default on Windows 7 but to get the full benefit of ClearType you need a high-quality,...
View ArticleWhat are the risks of connecting to a public wireless network?
Although, Public wireless hotspots or networks are very convenient, but they present many risks if not properly secured. Whenever possible, only connect to wireless networks that require a network...
View ArticleWhat is a digital ID in an email message?
You use digital IDs to prove your identity and encrypt text when sending email messages. This permits your recipients to determine that the message was actually sent by you and keeps your conversation...
View ArticleJava web-attacks mitigation solution
Microsoft released a fix that mitigates all Java web-attack vectors through Internet Explorer. This fix covers current and past versions of Java, and all supported versions of Internet Explorer (32-bit...
View ArticleFree DNS Sniffer utility
A free Windows utility from NirSoft allows you to capture and display DNS traffic on your system. The utility called DNSQuerySniffer is capable of displaying the Host Name, Port Number, Query ID,...
View ArticleRemoval Guide for Ramsomware
In case your computer gets infected with the ubiquitous ransomware that pretends to be some form of action by the Department of Justice, Department of Homeland Security, or the FBI and that states...
View ArticleRisks of Free Apps and Rooted Devices
McAfee June’s Consumer Mobile Trends Report explores some of the threats posed by free Apps where free Apps and rooted devices may abuse permissions to deliver profits to criminals. Under the...
View ArticleUsing nmap scripts to enhance vulnerability assessment results
There is an alternative to perform vulnerability assessments to SCADA devices less risky and with good result information. You can use nmap scripting engine to add vulnerability scanning functionality....
View Article5 Essential Tips for Windows 8 Networking
5 important tips about Windows 8 networking that will make your life easier as a Windows 8 user. 1. Know Your Connection Status Windows 8 wireless connection status is new but is still pretty...
View ArticleMalware Prevention and Handling Guide
This publication provides recommendations for improving an organization’s malware incident prevention measures and handling for Desktops and Laptops. It also gives extensive recommendations for...
View ArticleUnveiling an Indian Cyberattack Infrastructure
The report below details a cyber attack infrastructure that appears to be Indian in origin. This infrastructure has been in operation for at least three years, more likely close to four years. The...
View ArticleWindows Phone 7 Application Security Survey
A survey by Andy Grant investigated the practices of major app developers with regard to data storage on Windows Phone 7. As more people use mobile devices for sensitive tasks such as, online banking...
View ArticleSecurity Guidelines for Windows 7 and Windows 8
The security guidance published by the UK government’s National Technical Authority for Information Assurance (CESG), is applicable to devices running Enterprise versions of Windows 7 and Windows 8,...
View ArticleGoogle’s Project Shield
Project Shield is an initiative launched by Google Ideas to use Google’s own Distributed Denial of Service (DDoS) attack mitigation technology to protect free infrastructure online. The service allows...
View ArticleRecovering a user local profile flagged as ‘backup’
At times strange things happen with user local profiles on both Windows Servers and client systems such as, when a user local profile unexpectedly turns to a backup status and freezes in that state....
View ArticleTails Operating System
Tails is a live system that aims to preserve your privacy and anonymity. It helps you to use the Internet anonymously and circumvent censorship almost anywhere you go and on any computer but leaving no...
View ArticlePenetration testing tool for domain controllers
Smbexec is a tool that you can use for penetration testing domain controllers; the program allows running post exploitation for domain accounts and expanding the access to targeted network. This gives...
View ArticleProduct Review: PDF Watermark Remover
PDF Watermark Remover: Removes Digital Images, Stamps, Graphics, Logo Watermarks are the digital signatures that approve that the document is the property of an organization, a person or any legal...
View Article
More Pages to Explore .....