Results »

Kali Linux, Successor of the BackTrack Penetration Testing Distro. The authors BackTrack presented Kali Linux 1.0, a new distribution for security checks of operating system. Offensive Security company introduced a new distribution for security research of the system – Kali Linux, which replaced the earlier developing project BackTrack Linux and released instead of the expected […]

Modern programmers poorly represent the real work of a computer system. Now program the information objects, rather than specific pieces of silicon. For the vast majority of people who consider themselves programmers processor is a kind of phantom object, with some conventional characteristics and properties, the main criteria which are abstract Gigahertz, Core, Cache and […]

BitDefender Total Security 2013 – integrated tool to detect malicious programs. Total Security additionally provides file encryption, online backup and more! He copes with all kinds of viruses. Bitdefender Total Security 2013 now has a user-friendly interface and requires half the time to install than previous editions. New tools included in the Total Security 2013 […]

Latest IT Security News Researchers warn about distribution of a set of the Whitehole exploits According to Trend Micro, an antivirus company experts have found a new set of exploits that can avoid detection by anti-virus solutions, as well as blocking of the service Google Safe Browsing. The experts also noted that the functional Whitehole […]

The company Check Point Software Technologies has introduced a new line of consumer products under the name 2013 ZoneAlarm security software to access the Internet. The main difference between the new line include full compatibility with Windows 8, as well as support functions first introduced Facebook Privacy Scan to verify the safety records in chronological […]

The Government of Japan is offering $ 36,000 for information about the creator of the virus The Government of Japan has announced a reward of $ 36,000 dollars for any information that would allow to catch the virus creator, to send an electronic message boards and boxes of various organizations and individual Internet users ads […]

As parents of teenagers we are concerned about the dangers of social networking. While our children are digital natives, we have virtually come to the world of new technologies, we are digital immigrants. Sometimes we are disoriented, lost, we do not know how to protect them and we tend to forbid. We must understand that […]

The software-defined wide area network (SD-WAN) services are growing in popularity. Currently, many organisations, buoyed by the need to use the new versions of SDNs, are turning to SD-WANs as the perfect solution to the problems that are associated with the use of traditional WAN technologies. Besides, many organisations are turning to SD-WANs as opposed […]

A compromise of your computer network is very often a confusing experience. Aside from the fact you can’t actually see where and how your property was tampered with or stolen, the possibility you did your best to secure your systems and still lost data can be unnerving. So what should you do in the immediate […]