уторак, 31. јануар 2012.

Zonet Wi-Fi Camera

with Night VisionAbout.com Rating 4.5 Star RatingBe the first to write a reviewFrom Tony Bradley, CISSP-ISSAP, former About.com Guide

See More About:zonetwifi cameranight visionsecurityproduct review

View the Original article

UAC UIAccess Secure Desktop

Internet / Network SecuritySearchNetwork SecurityCybercrimeSecure Win/MacSocial/MobileShare

Discuss in my forum

User Account Control: Allow UIAccess Applications to Prompt w/o Secure DesktopConfiguring Vista User Account Control SettingsFrom Tony Bradley, CISSP-ISSAP, former About.com Guide

See More About:allow uiaccess applications to prompt for elevation without using the secure desktopuacconfigure uac in vistaThis security setting controls whether User Interface Accessibility (UIAccess or UIA) programs can automatically disable the secure desktop for elevation prompts being used by a standard user.

If you enable this setting, UIA programs including Windows Remote Assistance can automatically disable the secure desktop for elevation prompts. Unless you have also disabled elevation prompts, the prompts will appear on the interactive user's desktop instead of the secure desktop.

If you disable or do not configure this setting, the secure desktop can only be disabled by the user of the interactive desktop or by disabling the "User Account Control: Switch to the secure desktop when prompting for elevation" setting.

UIA programs are designed to interact with Windows and application programs on behalf of a user. This setting allows UIA programs to bypass the secure desktop to increase usability in certain cases, but allowing elevation requests to appear on the regular interactive desktop instead of the secure desktop increases your security risk.

Since UIA programs must be able to respond to prompts regarding security issues, such as the UAC elevation prompt, UIA programs must be highly trusted. In order to be considered trusted, a UIA program must be digitally signed. By default, UIA programs can be run only from the following protected paths:

..

View the Original article

уторак, 10. јануар 2012.

Retrophitted Retrophish

    Home News Features Opinions News Bytes Editorial Videos In Focus Videos Products Podcasts Canada Newsletters Products Group Tests First Looks Products About Reviews Blogs The News Team Blog The Data Breach Blog The SC Magazine Awards Blog Extras ebooks Case Studies Slideshows Spotlights Buyers Guide Whitepapers IT Security Jobs Events SC Awards U.S. SC Congress Canada SCWC 24/7 SC Awards Canada SC Congress New York Editorial Webcasts Vendor Webcasts Subscribe Newsletters Subscribe to SC Archive Archive Featured Topics: Patches Malware Breaches Government Cybercrime Corner Congress Canada Canada News

View the Original article

недеља, 8. јануар 2012.

Prevent Identity Theft

Most PopularLatest ArticlesRSSAdvertise on About.comOur StoryNews & EventsWork at AboutSiteMapAll TopicsReprintsHelpWrite for AboutUser AgreementEthics PolicyPatent Info.Privacy PolicyYour Ad Choices

©2012 About.com. All rights reserved. 

A part of The New York Times Company.



View the Original article

Computer and Network Securi...

Internet / Network SecuritySearchInternet / Network SecurityCybercrimeSecure Win/MacSocial/MobileShare

Discuss in my forum

Top 10 Computer and Network Security BooksFrom Tony Bradley, CISSP. MCSE2k, MCSA, A

View the Original article

Free Network Monitoring

English, Italian, German, and Russian

FREEping - Server Pinging
Do you want to know if all your Windows 2003-XP-2000-NT servers are alive and pinging? Do you want to receive a pop-up message when one of them is not running anymore? FREEping is a free ping software utility which will ping all your IP addresses in free-definable intervals. FREEping automatically pings in the background and shows statistics for each pinged hosts. When a host stops responding, FREEping can send popup messages to a specified destination.

Servers Alive
Servers Alive is an end-to-end network monitor program. Among the many checks it can do: it can monitor any Winsock service, ping a host, check if an NT service/process is running, check the available disk space on a server, retrieve a URL, check your database engine, and more.

Suggested ReadingFree Intrusion Detection (IDS) SoftwareFree Packet Sniffer SoftwareFree Encryption SoftwareNetsecurity Book ReviewsBuilding Secure Wireless Networks With 802.11Hacker's Challenge 2Network Perimeter Security: Building Defense In DepthNetsecurity ArticlesInterview With Eric ColeVPN's: IPSec vs. SSLIn Depth SecurityRelated ArticlesLinux IP Masquerade How-To - Configuring Microsoft Windows 95 and OSR2RSS Reader in Python - Building an RSS Reader With Python - Running on a We...Linux Network Administrators Guide - NIS Server SecurityWeb Hosting Company Customer Review - Handy Networks, LLC.Ubuntu Server Guide - Windows Networking

View the Original article

Top 5 Anti-Spyware 2009

Top 5 Antispyware Products 2009: Listing of Top 5 Products to Detect, Block, and Remove Spyware for 2009HomeComputing & TechnologyInternet / Network Security

View the Original article