Posts

Showing posts from July, 2017

BYOD Policy

This document is intended to communicate corporate policies established for Bring Your Own Device(BYOD) practices. Devices such as smart devices (i.e. Smart Phones and Tablets PCs) and laptops are concerned by this document. Usage and access to corporate network and corporate resources are provided under the condition that users have carefully read and understood the contents of this document and sign that they agree to adhere to this corporate BYOD policy. Expectation of Privacy SLIIT will requests access to the device by technicians to respect their privacy with your personal device and to respond only to security checks or to legitimate requests for discovery resulting from administrative criminal proceedings or civil. Acceptable Use ·          Devices should not be used by the users in a way that it will not hares others. ·          Devices should not be used by the users to navigate pornography websites, sexist, racist or other offensive material. ·         

Firewall

Hellow Peeps!! Today i'm going to talk about  the firewall. so let's see what is firewall and what firewall can do. What is the Firewall? Most of us may have heard the term, and know it’s related to security in some way, but do you really know what is a firewall? Traditionally, firewalls were built to keep danger at bay, they were doors (or walls) to block fire from coming into another area, hence the name firewall. When you’re thinking in terms of your online security, modern-day hardware and software firewalls are similar. They act as barriers to prevent unauthorized access to your personal information. Firewalls are software programs or hardware devices that filter the information coming through your Internet connection to your computer (and all the devices that are connected to that connection). A firewall protects you and your devices by examining each piece of information that flows between your devices and the Internet. Hardware firewalls, such as those includ

VPN

Image
Hellow Peeps!!! Today I'm going to say some kind of thing, we need to know before the hacking or when we use the internet. What is VPN?  VPN is a Virtual Private Network. A VPN hides the IP address, communication of your computer and the internet.  This impenetrable tunnel prevents criminal organizations, your ISP or even your government to spy on your communications. It enables a host computer to send and receive data across shared or public networks as if they were an integral part of the private network with all functionality, security, and management policies of the private network. This is done by establishing a virtual Point To Point connection through the use of dedicated connections, encryption, or a combination of the two.   Why we need the VPN? Get a new IP address: - when we use the VPN it will give a new IP address to us. then nobody can discover our identity through it. Bypass censorship: - with the VPN you will taste the full and real interne

IoT Fuels Growth of Linux Malware

Malware targeting Linux systems is growing, largely due to a proliferation of devices created to connect to the Internet of Things. That is one of the findings in a report WatchGuard Technologies, a maker of network security appliances, released last week. The report, which analyzes data gathered from more than 26,000 appliances worldwide, found three Linux malware programs in the top 10 for the first quarter of the year, compared with only one during the previous period. "Linux attacks and malware are on the rise," wrote WatchGuard CTO Corey Nachreiner and Security Threat Analyst Marc Laliberte, coauthors of the report. "We believe this is because systemic weaknesses in IoT devices, paired with their rapid growth, are steering botnet authors towards the Linux platform." However, "blocking inbound Telnet and SSH, along with using complex administrative passwords, can prevent the vast majority of potential attacks," they suggested. New Avenue for