Network Security Blogs | lifestyle blogs
   
     lifestyle home          living offers            fashion archieves                Intiatives          Health News            life style Advertise          rss           Contribute                     Write Blog
 
     


Technology >> Network Security
 
« Previous Entries

Tips for Credit card

Monday, June 16th, 2008
by Sue

Credit CardsThe credit card companies implemented various measures to protect the credit card fraud. Right from paperless feature to SSL security measures the credit card companies faces several threats.

The credit card is billion-dollar business so every year many people face fraud. Despite of several measures taken by the credit card companies there are different faults at the customer end as well as careless handling can increase the possibilities of fraud. There are many possibilities of fraud against your credit card. You must remember some tips to get safety against the possible fraud.

1. The most important point for protection of credit card is disclosing the credit card number through various ways such as on the phone, email or over the website which does not provides SSL security. Always follow the security rules.

2. The second most important consideration is disclosing a PIN number. If your card getsCredit Cards stolen the person swipes the card as well as use at ATM. You must ensure that you never get sign blank credit card receipt.

3. You must have to monitor the regular statement of your credit card carefully. If you find any unknown figure please clarify with the customer care department for further scrutiny.

4. It is most important for you to put the credit card in the safer place. If you find your card gets stolen you must inform the credit card company immediately and close your credit card for further transactions.

5. To make the safety you must note down the credit card number with expiry date as well as company number. Incase your credit card stolen, you immediately inform the company.

Credit Cards

Don’t have a computer? Try the virtual computer !

Thursday, May 8th, 2008

You have heard of desktops and laptops, but now two engineering students in Kerala have come up with a virtual computer that can be accessed from anywhere in the world. All it needs is an internet connection.

K Ansar and PP Ismail, final year computer science students at an engineering college in Vatakara, have set up www.bloxtr.com, the prototype of a virtual computer in which you can store all your important documents, favorite music, colorful pictures and even videos.

“The idea is that no one needs to carry a laptop or pen drive around. You can upload any files to the website and access it from any corner of the world. What you need is just an interface to access the internet,” Ansar told IANS.

nsar and Ismail are fans of Richard Stallman, the free software guru, and they are also keen on popularising the competency of open source software.
Ismail said bloxtr is just a project and doesn’t yet have the speed and features of professional applications. They are hoping for investment by corporate firms for the further development of their prototype.

According to the students, people are largely ignorant about the opportunities that open source software provides. They stumbled upon the idea of a virtual computer while mining the internet.

“We’d like to popularise the concept of the virtual computer. As far as we know such a facility does not exist. Google has Google Docs to store and edit documents or spreadsheets, while websites like ibackup.com provide the facility of creating backup data.

“The open source platform for creating a virtual computer is available on the internet. Open source platforms are available free for any kind of project,” said Ansar.

We want to make bloxtr more elaborate so that one can install software of one’s choice on the virtual computer,” he said.

“We are trying to convert this into a mobile application. When 3G services become operational in the country we think the virtual computer will really be an attractive proposition,” Ismail said.

Ismail and Ansar, along with three other classmates, have already won a project from a local software company on behalf of a Gulf-based airline to develop a system to make flight schedule information available on mobile phones.

They are also planning a project to network educational institutions. “This is a long-term project, under which we plan to provide a website from where information on students from the networked institutions can be retrieved,” said Ismail.

“If a parent wants to ascertain the score of his child he can access it directly from his home. For employers who are on the lookout for talent, this database could be a good source. We are also planning a virtual classroom. Eighty per cent of the work on this is complete,” he added.

Underwater Hotel

Thursday, January 24th, 2008

Underwater Hotel Currently under construction in Dubai Hydropolis is the world’s first underwater luxury hotel. It will include three elements: the land station, where guests will be welcomed, the connecting tunnel, which will transport people by train to the main area of the hotel, and the 220 suites within the submarine leisure complex. It is one of the largest contemporary construction projects in the world, covering an area of 260 hectares, about the size of London ’s Hyde Park .

This will be a hotel where those who do not dive - or do not even swim - can experience the tranquillity and inspiration of the underwater world.

In order to enter this surreal space, visitors will begin at the land station. This 120m woven, semicircular cylinder will arch over a multi-storey building.

The upper storeys of the land station house a variety of facilities, including a cosmetic surgical clinic, a marine biological research laboratory and conference facilities.

The world of science fiction becoming reality.

The shallow water hotel will be shaped as a bowl and will be positioned on the sea ground, according to Hohmann. The deep water version is floating in the sea with anchors on the ground.

The bowl will be constructed externally and then positioned on the location. It will then be emptied of the water and equipped with huge aquariums as an attraction for the guests. “At the shallow water hotel, guests are exposed to big fish tanks that contain controlled water and fish, since shallow water is muddy and not transparent. At the deep water hotel, visitors are looking directly into the sea

Network Security Tips

Tuesday, January 22nd, 2008

network securityThis basic Network Security Guide provides useful security tips and methods to secure your network such as installing a updated antivirus program, email scanning programs, network monitoring tools, internet access policy and other security prevention methods.

  • Security Threats

There are a number of security threats that can be the cause of a network security attack. Main security threats are denial of service, distributed denial of service, viruses, Trojan horses, spywares, malwares, unauthorized access to the network resources and data, accidental deletion of the files and the uncontrolled internet access.

  • Virus Attack

A computer virus is a small program or an executable code that when executed and replicated, perform different unwanted and harmful functions for a computer and a network. Viruses can destroy your hard disks and processors, consume memory at a very large scale and destroy the overall performance of a computer or network. A Trojan is a malicious code that performs harmful actions but it cannot be replicated. Trojan can destroy systems’ critical data. A computer worm is a program that replicates to all network and destroy useful data. The viruses, malware, adware and Trojan horses can be prevented if you have an updated antivirus program with the latest pattern files.

  • Security policy

Being a network administrator, you should implement a security policy in your network and educate your network users and other employees about the security threats.

  • Email scanning

Email is a big source of a virus and malicious code. You should have installed an email scanning and monitoring program. You should also have a tight security policy at your proxy server and should block the unnecessary ports and web applications.

  • Unauthorized Access

Access to the network resources and data should be allowed only to the authorized persons. Every shared folder and resources in your network should have been accessed only by the authorized persons and should also be scanned and monitored regularly.

  • Accidental deletion of the files

What will you do if you accidentally delete your organization’s critical data? This is a question, which every network administrator and security specialists thinks of and wants answer. Few days before I read on internet news site that a computer technician accidentally deleted a financial company’s $ 10 billions records. To avoid the big troubles like this for you and for your company, you should have excellent data recovery software in your software inventory. Many data recovery tools are good enough to recover every piece of data if the hard disk is not physically badly damaged.

  • Network Monitoring Tools

You must have a good network monitoring tools to detect various suspicious things and monitor the various activities in your network such as network traffic, open ports, useless shared folders. GFI LanGuard Network security scanner is a good scanning and monitoring tool and it checks for all the possible methods, which a hacker can use to attack your network.

  • Internet Access Control

Internet can be a big source of viruses and the major security attacks, if you are unable to implement a tight security policy in your network, if you have a old definition anti virus program and if your haven’t put any check on your network user’s activity. Your gateway or proxy server, which is directly exposed to the internet should have very tight security, updated antivirus program and network monitoring tools.

  • Information Theft and cryptography attacks

Another threat to a network is to loss of the important information and this loss can be prevented, if you good encryption methods such as 128 bit security or 256 bit security encryption methods. In this way, your data when transferred through FTP programs, can be encrypted and can’t be read or use.

  • Unauthorized application installations

Another virus and security attack prevention method is to install only the authorized software applications to your network server and your all client computers. Nobody should be allowed to install any kind of program which can cause security threats such as songs or video programs, codec, gaming software or other web based applications.

Network Security Tips

Wednesday, January 2nd, 2008

Network security tips

network security tips

  • Make sure you have a security policy in place -— The security policy is the formal statement of rules on how security will be implemented in your organization. A security policy should define the level of security and the roles and responsibilities of users, administrators and managers.
  • Make sure all of your operating systems and applications are patched with the latest service packs and hotfixes -— Keeping your systems patched will close vulnerabilities that can be exploited by hackers.
  • Keep an inventory of your network devices -— Develop and maintain a list of all hardware/software components, and understand which default software installations provide weak security configurations.
  • Scan TCP/UDP services -— Turn off or remove unnecessary services. Unneeded services can be the entry point attackers use to gain control of your system.
  • Establish a strong password policy -— Weak passwords could mean a compromised user account.
  • Don’t trust code from non-trusted sources.
  • Block certain e-mail attachment types -— This list includes .bas, .bat, .exe and .vbs.
  • Don’t provide more rights to system resources than necessary -— Implement the concept of “least privilege”.
  • Perform your own network security testing -— Find the holes before the attackers do!
  • Implement “defense-in-depth” -— Don’t rely on just one control or system to provide all the security you need.



Home | Offers | Archives | Intiatives | News | Advertise | RSS | Writers Area | Terms & Conditions

DISCLAIMER: "All the articles/blogs on this site are sole property of its authors. life-styl.com and any of its associates does not warrant or assume any legal liability or responsibility for the originality, accuracy, completeness, or usefulness of any information or product represented on this site"

Fashion Blog    Top Blogs    Personal Business Directory - BTS Local    blogarama.com   Best Blogs Asia    Blog Directory   Blog Directory   BrowseBlogs   Blogsratingm   blogsarchive   The Blog Resource   MyBlog2u - Blog Directory Link Exchange Exchange Links