The notion of passwords is not flawed, but rather it is the type of passwords that are commonly used that lead to password or security breaches. You need to have a complex and a strong password which needs to be changed on a regular basis in order to mitigate a successful password attack on your […]
Continue ReadingCategory: Security
IT Security Interviews Exposed
IT Security or Information Security has steadily grown from being an obscured field of work in some government or military or financial institutions to become a mainstream activity practiced by many professionals including myself. The growth of Internet and the challenges that come with securing the ever growing interconnected digital world along with the anonymity […]
Continue ReadingHow to remove Tracking Cookies
Tracking Cookies while generally of a low threat level to your PC, they are still classified as Spyware. This article describes what a tracking cookie is, how to identify tracking cookies and finally how to remove tracking cookies. What is a tracking Cookie? Tracking cookies usually track the session of a user to a particular […]
Continue ReadingExternal Content Threats Security and Web Beacons
For IT Security folks, especially those in a large corporation, dealing with Threats Security or External Content Threats Security has a potential to take away a significant operations time. So what is External Content Threats Security? External Content Threats Security usually involves threats through many threat agents which evolve over time. These threat agents […]
Continue ReadingRemove Powered by Zedo & URL.cpvfeed.com Popups
Spyware such as Zedo, powered by Zedo and URL.cpvfeed.com redirects your browser or opens popups displaying advertising. Step by step security article on How to remove the Zedo, powered by zedo, URL.cpvfeed.com popups and also remove the core.sys rootkit.
Continue Reading