Pages

Tuesday, April 20, 2010

All about keylogger


By : Sienna Johansson

What actually is a Key logger?
A key logger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer keyboard.

According to experts, keystroke loggers pose more risk to PC users than any other tool used for committing crime online. They are small programs or hardware devices that monitor each keystroke you type on a specific computer keyboard, including typos, backspacing and retyping.

Thursday, August 28, 2008

10 More Tips and Tricks to Make Windows Easier

By : Duncan
As promised, here are a further list of tips and shortcuts to make your usage of Windows a bit more slick. Some of them you may know, but it's amazing (to me at least) how many people don't know these simple shortcuts and helps.

(If a key name is in bold, it means you HOLD IT DOWN while pressing the other keys)

1. When entering things like usernames and passwords into a dialog box, you normally press tab to go to the next item. If you want to go backwards (or up) to the previous item, press Shift Tab. This is useful when you want to type over whatever is in the edit box, as shift tabbing to it makes it highlighted, so that you just type, and that highlighted text is replaced without you having to delete it first.

DOWNLOAD WINDOWS VISTA

by : Gen Wright

We are all witnesses of how the Windows operating system has evolved since Windows 95. You have to admit, the Windows operating system has come a long way. From Windows 95, an OS that's very buggy and often crashes to the current highly visual Windows Vista. So what happened in between?

Well, we have Windows 98, Windows Millenium, Windows 2000, and for enterprise level systems, we have Windows NT and Windows Server 2000. These different operating systems are created to suit the needs of the various market segments. A home user will choose the home edition, and a developer could choose the professional edition.

Wednesday, July 16, 2008

Back to Back User Agents for Telecommunications

by: Danny Loeb

Today’s telecommunications networks are a delicate blend of clients and servers that together offer virtually endless possibilities when it comes to services and applications. For every new client developed, there seems to be a score more on the way — from mobile handsets, PDAs, terminals, telephones, video phones, IP set-top-boxes, and so on.

There are essentially two types of servers that connect between clients on large networks: Proxy servers and Back-to-Back User Agent (B2BUA) servers. The more prevalent Proxy servers feature predictable behavior — simply connecting between clients. Effectively, B2BUA servers are much stronger and intelligent entities that perform actions which Proxy servers cannot. Moreover, B2BUA servers provide a flexible solution for a wide range of applications and services and are becoming the primary engine for more and more SIP servers in NGN and IMS networks.

Can Data Breaches Be Expected From Bankrupt Mortgage Lenders?

by: Tim Maliyil


The stock market is in a tumult. Actually, it has been for about a year, ever since the subprime fiasco (anyone take a look at Moody's performance over the past year?) Now that that particular issue has been beaten to death, other mortgage related issues are cropping up. Most of the stuff covered in the media is financial in nature, but some of those mortgage related issues do concern information security.

It's no secret that there are plenty of companies in the US that discard sensitive documents by dumping them unceremoniously: leave it by the curb, drive it to a dumpster, heave it over the walls of abandoned property, and other assorted mind boggling insecure practices. In fact, MSNBC has an article on this issue, and names numerous bankrupt mortgage companies whose borrowers' records were found in dumpsters and recycling centers. The information on those documents include credit card numbers and SSNs, as well as addresses, names, and other information needed to secure a mortgage.

Sunday, July 6, 2008

by : Len Hutton

Blogs are now an extremely popular and important part of the internet. Millions of people blog every day. As blogs have evolved over the years, so has the commenting system. Now anyone can make comments on a particular blog posting. As blog commenting has grown more popular, so has spam commenting. In this newsletter, we’ll go over why comments are a great form of feedback for your blog, how they help the credibility of your content, what spam comments are and how to prevent them from happening.

How to Clean the Registry

by : Ray Gaide

In the beginning Windows' registry consisted of two files totalling around 5mb in size. Today it consists of at least 12 files with the Software file itself being 30mb or bigger in size. As the size of the registry has exploded, so has the trash and clutter in it. It may seem like a daunting task, but cleaning the registry properly can fix system problems, speed your computer up, and make it run more efficiently.