Security: When a computer connects to a network and begins communicating with others, it is taking a risk. Internet security involves the protection of a computer’s internet account and files from intrusion of an outside user. Basic security measures involve protection by well selected passwords, change of file permissions and back up of computer’s data.
Security concerns are in some ways peripheral to normal business working, but serve to highlight just how important it is that business users feel confident when using IT systems. Security will probably always be high on the IT agenda simply because cyber criminals know that a successful attack is very profitable. This means they will always strive to find new ways to circumvent IT security, and users will consequently need to be continually vigilant. The Followings are best posts and articles of 2008 filed under security.
Hacking Google: Turning a Search Engine into an MP3 Download on HeyWireHacking. You can take everyone’s favorite all-purpose search engine and turn it into a web-crawling, MP3 ripping demon for you. The procedure itself isn’t as hard as you would think.
Blurred Out: 51 Things You Can’t See on Google Maps on ITsecurity. Here a nice post telling about Google Maps has slapped a “Prohibited” sign on 51 places and also idenfying some of them.
How to reveal blocked caller ID info on Engadget. A post telling abut the opening of the blocked caller ID.
How To Disable Your Passport’s RFID Chip on Wired. Read and be safe because All passports issued by the US State Department after have always-on RFID chips, making it easy for officials – and hackers – to grab your personal stats.
‘Forgot your password?’ may be weakest link in web security on MSNBC. Here is post telling about that the password resetting step may be the weakest link in security.
The ethics of Stealing Wifi on ArsTechnica. A recently released study by a security firm says that using an open WiFi network without permission is stealing. Ars looks at the ethics of open WiFi.
The Six Dumbest Ideas in Computer Security on Ranum. Here is post that is telling about the six dumbest ideas in the computer security.
“I Made A Fake Facebook And Had 100 Friends In 4 Days” on AnThingTech. Facebook is site with millions of users, but how secure is it? Or rather how security conscious are the people that use it? writer is raising such questions on facebook by this post.
Has Internet Explorer ever been safe? on ZDnet Blog. Read about how IE can affect your browsing experience.
2504 Steps to Closing Your Facebook Account on SteveMansour. Here in this post steve is telling “Yes, it’s true! I finally managed to close my Facebook account. It was a long, arduous road – the hardest part was slaying the Gorgon on level 16 – and I’m glad it’s finally over.”
Check if Your Gmail is Hacked with Activity Monitor on MakeUseOf. Here a review of nice little feature from Gmail team that lets you check if someone has hacked into your Gmail account.
How to catch hackers on your wireless network on TechRadar. Read here that How to catch hackers on your wireless network and how to defend your Wi-Fi from future attacks.
10 Worst Computer Viruses of All Time on HowsStuffWorks. Here let’s take a look at 10 of the worst computer viruses to cripple a computer system.
6 free security tools you shouldn’t live without on NetworkWorld. Here is a list of the six free security tools that all IT folks should know about and use.
Protecting Yourself From Suspicionless Searches on EFF. Here is method that HOWTO keep your laptop from being searched at the border.
Why Global Hackers Are Nearly Impossible to Catch on liveScience. A news post with analysis that why the glbal hackers are impossible to catch.
HOWTO: Travelers Guide to Customs-Proofing Your Laptop on News.com. A news post which is telling about that how to proof your laptop in travrlling.
’60 Minutes’: How online gamblers unmasked cheaters on Cnet News. A post here about that if you’re caught cheating in the popular and lucrative world of Internet poker, you may get away scot-free.
7 Fantastic Internet Hoaxes on InformationWeek, Despite our increasing technological sophistication, we can’t help falling for email about Bigfoot, giant mutant cats, doomed tourists, and deadly butt spiders.
How To Think Like An Online Con Artist on InfoWorld. Read and DO get permission before conducting these security tests!
7 Online Blunders That Threaten Your Identity on Yahoo! Finance. Read and apply that can help you in not doing that blunders.
10 IT security companies to watch on ITsecurity. Here is top ten list of the IT security companies which should be known to you.
Top 10 e-mail blunders of 2008 on ITWorldCanada. With Halloween lurking around the corner, messaging security and data loss prevention company Proofpoint has compiled some of the scariest e-mail blunders of the year.
10 GPS Vulnerabilities on C4i. Here Adams describes various threats to US satellites, systems that use their signals and a military that depends on falling stars.
Most Watched 10 YouTube Videos Last year in Security :