web-administrator-risk

How To Administer Risk Associated With Web Applications

Corporate around the world are working on innovative ideas and building web based applications as they provide flexibility, low maintainability cost, rich functionality and adds up the benefits of its own. Companies offering services are also major player and they will stay in the market for very long time (as per survey). Software as a […]

Continue Reading →

windows-vs-linux1

Linux v/s Windows: Linux is Winning

User community is slowly loosing its faith in Windows. Windows XP wins the heart of many people but Microsoft’s other products in OS range aren’t doing that well. Windows 7 is a buzz these days but many people from open source community feels that it will again be old wine in a new bottle. Community […]

Continue Reading →

banned-by-akismet

Are you banned by Akismet for spaming?

You must have experienced that you try to post comments on your friends blog but  your comment never appears. This happens because you are banned by Akismet. Akismet system has been protecting WordPress bloggers for a while now from comment and trackback spammers. Akismet system relies heavily upon blog owners marking your comments/trackbacks as spam […]

Continue Reading →

Strong passwords-realistic or burdensome?

Hackers and information thieves grow more sophisticated everyday. That forces you, your company’s main line of defense, to be more diligent. Passwords are a good example of this constant drive to protect your small company’s data. Large organizations have the benefit of more sophisticated security measures and policies, but small businesses have to rely on […]

Continue Reading →

10 common security mistakes that should never be made

The following is a list of ten security mistakes I see all the time. They’re not just common, though — they’re also extremely basic, elementary mistakes, that anyone with a modicum of security knowledge should know better than to make. Sending sensitive data in unencrypted email: Stop sending me passwords, PINs, and account data via […]

Continue Reading →