-
Recent Posts
Recent Comments
Archives
- May 2012
- April 2012
- March 2012
- February 2012
- January 2012
- December 2011
- September 2011
- August 2011
- June 2011
- May 2011
- April 2011
- March 2011
- February 2011
- January 2011
- December 2010
- November 2010
- October 2010
- September 2010
- August 2010
- July 2010
- June 2010
- May 2010
- April 2010
- March 2010
- February 2010
- January 2010
- December 2009
- November 2009
- October 2009
- September 2009
- August 2009
- July 2009
- June 2009
- July 2008
- May 2008
- December 2007
- November 2007
- July 2007
- May 2007
- April 2007
- November 2006
- September 2006
- August 2006
- July 2006
Categories
- .Net
- Anniversary
- Anti-Virus
- Art
- Backup
- Books
- Browsers
- Buffalo
- Car Dealerships
- Christmas
- Communication
- Computer
- Computer Security
- Computers and Internet
- Consumer
- device
- disposal
- DNN6
- DotNet
- DotNetNuke
- DotNetNuke World
- Entertainment
- Family
- Firewall
- Floral
- Florist
- Flowers
- Food and drink
- Funeral
- Health and wellness
- Internet
- Investing
- Iron City
- Iron Island
- Lovejoy
- Malware
- Memories
- Metadata
- Miscellaneous
- mobile
- Movers
- Moving
- Online
- Orlando
- Phishing
- Recovery
- router
- Scams
- Security
- Services
- Smartphone
- Social Sites
- Software
- Technology
- Travel
- Uncategorized
- Virus
- Wedding
- WiFi
Meta
Monthly Archives: August 2011
Cyber Security Tip ST06-001 – Understanding Hidden Threats: Rootkits and Botnets
National Cyber Alert System Cyber Security Tip ST06-001 Understanding Hidden Threats: Rootkits and Botnets Attackers are continually finding new ways to access computer systems. The use of hidden methods such as rootkits and botnets has increased, and you may be … Continue reading
Posted in Anti-Virus, Computer Security, Computers and Internet, Internet, Software, Technology, Virus
Tagged Botnets, rootkits
Leave a comment
OUCH! | August 2011 – Updating Your Software
OUCH! | August 2011 IN THIS ISSUE… • Overview• Operating Systems• Applications• Browser Plug-ins Updating Your Software GUEST EDITOR Mike Poor is the guest editor for this issue of OUCH! He isa senior security analyst for the consulting firm InGuardiansInc. … Continue reading
OUCH! | July 2011–Understanding Encryption
OUCH! | July 2011 IN THIS ISSUE… • What is Encryption?• Encrypting Stored Information• Encrypting Information In Transit• Best Practices and Caveats Understanding Encryption GUEST EDITOR Fred Kerby is the guest editor for this issue of OUCH! He recently retired … Continue reading
Cyber Security Tip ST04-024 – Understanding ISPs
Cyber Security Tip ST04-024 Understanding ISPs ISPs offer services like email and internet access. In addition to availability, you may want to consider other factors so that you find an ISP that supports all of your needs. … Continue reading
Posted in Computer Security, Computers and Internet, Internet, Technology
Tagged Computer Security, Internet
Leave a comment