Critical Java vulnerability
Post

Critical Java vulnerability

We would like to inform you that there is a critical new Java vulnerability and millions of devices around the world are at risk , Mozilla advises disabling Java in browsers Firefox to mitigate risk, while providing patching from Oracle Solution: Please stop all add-ons associated with Java in browsers that you use to avoid...

On January 15, 2013February 19, 2018by
Post

Come to Fixed Solutions booth at CairoICT 2011

Come to our booth in Hall 4 CairoICT 2011 , Fixed Solutions will show Arabhosters ,Ubuntu , Metasploit Pro , Nexpose Vulnerability Scanner , Acunetix Web Vulnerability Scanner , Astaro Security Gateway and NetClarity NAC ( Network Access Control )       Founded in 2006 , Arabhosters became rapidly one of the important hosting...

On May 20, 2011May 20, 2011by
Post

Computer security

1. What is computer security? Computer security is the process of preventing and detecting unauthorized use of your computer. Prevention measures help you to stop unauthorized users (also known as “intruders”) from accessing any part of your computer system. Detection helps you to determine whether or not someone attempted to break into your system, if...

On June 8, 2010June 8, 2010by
Post

Phishing and Pharming

Phishing and Pharming to Get your Information When using the Internet, unless you are very inquisitive, skilled and have a lot of time you know nothing about the site other than the name displayed by the site. Scammers work very hard to mask themselves from you with websites that appear legitimate. In fact, the setting...

On June 8, 2010June 8, 2010by
Post

Network Security

Some organizations are now investing larger budget dollars and resources into information security, and they’re starting by assessing their present level of risk with an audit. If your company relies on the Internet and was one of vast number that missed the vulnerability used by the Code Red virus, you know how the lack of...

On June 8, 2010June 8, 2010by
Post

Web Security Appliance With Apache

As more and more attacks are being carried out over the HTTP layer there is a growing need to push the envelope and bring Web security to new levels. Most existing tools work on the TCP/IP level, failing to use the specifics of the HTTP protocol in their operation. The need for increased security has...

On June 8, 2010June 8, 2010by
Post

Using Linux Scripts to Monitor Security

This paper will show how to use basic Linux scripting to create a reusable network security monitor that is easy to use and easy to maintain. The purpose of this exercise is introduced with suggestions where it might be useful. Linux commands are discussed, along with techniques to automate them and interpret their results. Methods...

On June 8, 2010June 8, 2010by
Post

Secure Web Based Mail Services

There used to be a time when secure email management was simple. “Managing” meant sorting through your email messages, putting them into appropriate folders. Secure email back them meant using a simple password for email access. However, today, with email being a business critical application, more threats against email than ever before, government regulatory concerns,...

On June 8, 2010June 8, 2010by
Post

8 Layers of Security Every Computer Should Have

So what do we need on our computers to protect our data? Thompson says the best way to set up computer security is through layering. Even if one area of protection is only 75 percent effective, the increasing layers will close all the holes. Those layers should include the following: Firewalls. Firewalls protect the computer...

On June 8, 2010June 8, 2010by
Post

How We Sped Up Our Website

Posted by Ken Hardin 10 Tips For Speeding Up Your  Site .1 Move Your DNS  To The Cloud Troy said this may well have been the single biggest step we took to improve our site performance metrics. By moving to a DNS provider with servers across the globe, our users no longer need to make...

On June 8, 2010June 8, 2010by