Are VPNs a Valid Privacy Tool ?


Is privacy a right, or in this world of terrorist threats is it something that we have to accept as a price to pay for keeping us safe. For many people the two are not mutually exclusive, and for many losing that privacy means that those who threaten us have won. The problem is that…

Read More

What Exactly is a Sneaker Proxy?


Online anonymity is important to many people for a variety of reasons. If you are unlucky enough to live in a country where the state controls and prosecutes people based on what they say online there’s obviously a priority. Many others are simply concerned about the abuse and control that the state and large corporations…

Read More

Common Lower Layer Protocols – ARP


One of the most useful protocols to understand especially when troubleshooting networks is that of the address resolution protocol. This is used to map internet addresses to hardware addresses at the lower layers of the OSI model. If you’re looking at figuring out issues in an unfamiliar network then having a good working knowledge of…

Read More

The Importance of the Software testing Cycle


If you’ve ever worked on a large IT project which has it’s own testing department, then you know it can be quite time consuming work. What’s worse you can sometimes be seen as a hindrance to the project rather than something that creates a quality product. Often you’ll see project managers who are more consumed…

Read More

The Security Dilemma – Passwords and Authentication


For those of us who’ve worked in IT for a few decades, the whole idea that we still use passwords as a means of authentication is quite remarkable. I remember many discussions in work and bulletin boards over twenty years ago about how insecure they were and the numerous better solutions. However they’re still very…

Read More

Coding a Football Computer Game


Coding sports games is not as simple as it sounds at least not to produce a really professional product. The easiest tasks involve management games like Football Manager which although complex are often just a matter of number crunching and analysing statistics. However games like FIFA 18 produced by Electronic Arts are arguably some of…

Read More

Computer Extortion – Common Techniques


Attacking large corporate websites, either through sabotage because the attacker is a disgruntled employee or disagrees with the company’s ethos, or to extort money from the company is becoming increasingly common. Large e-commerce sites are especially vulnerable since downtime on the website results in a huge toss of revenue and reputation. it extortion is involved. it is…

Read More

Management Review of an ISMS


It is important that management be involved in all stages of developing an ISMS for your business however there is a formal stage where they must review the documents before acceptance. Management/Directional Overview of the ISMS Management will review the organization’s ISMS at planned intervals to ensure its continuing suitability, Adequacy and efficacy. This review…

Read More

Creating an Information Security Standard using BS 77999-2


This British Standard has been ready for business managers and their staff to provide a model for setting up and controlling your stresses an efficient Information Security Management System (ISMS). The adoption of an ISMS should be a strategic decision for an organization. The design and implementation of an organization’s ISMS depends upon business needs…

Read More

Investing in Cloud Computing


Cloud computing is a powerful tool which helps to make online meeting very close to reality. This is because the cloud services are scalable and flexible which is very good for growing businesses. It will help to turn significant capital expenditure into operational expenses. There are many online marketing companies which provide this service but…

Read More

← OLDER POSTS NEWER POSTS →