Internet Security – Chrome
In this section, we will see the most used explorer from the security viewpoint. What settings should it have in order to minimize the attack surface that can come from…
In this section, we will see the most used explorer from the security viewpoint. What settings should it have in order to minimize the attack surface that can come from…
Social Networking is the use of Internet based on social media systems to get in touch with family, friends, customers, classmates, etc. Social Networking can be done for social purposes,…
Many of us have received similar emails as shown in the following screenshot. They appear as if coming from a genuine source, but in fact if we analyze them a…
Cookies are files, generally from the visited webpages, which are stored on a user's computer. They hold a small amount of data, specific to a particular client and website, and…
With the ever-increasing usage of Internet, numerous activities take place in your computer and it can be for either good or bad. These activities vary from identity theft to people…
In this section we will explain some important compliances that are around the technology industry. Nowadays technology compliance is becoming more important because it is developing too fast and legal…
In this chapter, we will discuss on an advanced checklist that we will use in order to educate users and IT staff too, when it comes to any security issues,…
In this chapter we will explain security policies which are the basis of security for the technology infrastructure of your company. In a way they are the regulatory of the…
In this chapter we will discuss regarding the network from the view of security. We will also look into which are the systems that help us as system administrators to…
Disaster recovery is generally a planning process and it produces a document which ensures businesses to solve critical events that affect their activities. Such events can be a natural disaster…