Computer Technology Crime Fighting Computer Systems and Databases

Crime Fighting Computer Systems and Databases

As crime globalizes, so does crime fighting. Mobsters, serial killers, and terrorists cross state lines and borders effortlessly, making use of the latest advances in mass media, public transportation, telecommunications, and computer networks. The police – there are 16,000 law enforcement agencies in the United States alone – is never very far behind. As crime …

Read Article Read More

Computer Technology Steps to Securing Your Windows XP Home Computer

Steps to Securing Your Windows XP Home Computer

Learn the simple steps you need to take to protect your computer from common internet and other security risks. It is easy and will not cost you a lot of money. Most people are aware that there are continuous security issues with Microsoft’s Windows operating system and other programs. However, what most people do not …

Read Article Read More

Information Security SSL/TLS

SSL/TLS

The SSL (Secure Sockets Layer) or know as TLS (Transport Layer Security) is a building block and not just a standalone application. It is the foundation for secure communication in a lot of networked applications. Netscape Communications developed the SSL originally. In 1995, version 2.0 was released and the first version made available publicly. In …

Read Article Read More

Information Security Asymmetric-key Cryptography (Public Key Encryption)

Asymmetric-key Cryptography (Public Key Encryption)

Asymmetric key encryption is a cryptographic system that uses pairs of keys. Public keys can be distributed widely. Private keys can only be known to the owner. This achieves encryption and authentication, where the public key verifies a holder of the paired private key. Any user can encrypt a message by using the receiver’s public …

Read Article Read More

Information Security Symmetric-Key Cryptography (Private Key Encryption)

Symmetric-Key Cryptography (Private Key Encryption)

Symmetric key encryption is the oldest and best-known technique. It can be utilized to secure communication between two or more parties with a shared same secret key. A secret key, which can be a number, a word, or just a string of random letters, is applied to the text of a message to change the …

Read Article Read More

Application Security SQL Injection

SQL Injection

This article shows you another popular attack on websites and APIs today with relevant simple examples. Furthermore, you can learn how to identify and how to prevent SQL Injection attacks. What is SQL Injection SQL injection is a Web security vulnerability that facilitates an attacker to modify the SQL queries that an application sends to …

Read Article Read More

Application Security Cross-site request forgery (CSRF or XSRF)

Cross-site request forgery (CSRF or XSRF)

Cross-site request forgery, known as CSRF, XSRF, Sea Surf or Session Riding is also one of famous web security vulnerability which facilitates attacker to gain over fully access victims’ account when the user logged in particular account like Online Banking, otherwise can define as it attacks a web application in which they’re currently authenticated. The …

Read Article Read More