Open Source

Untuk seluruh software yang bersifat Open Source tidak akan tenggelam oleh waktu dikarenakan banyak yang mendukung program tersebut dan software tersebut tidak kalah bersaing dengan software berbayar lainnya.

Selasa, 19 Februari 2013

Are You Gambling with Your Mission-Critical Security Assets?

You’ve probably met someone like Patrick—the password post-it scribbler. Whenever end-user Pat signs up for an online service, the registration process forces him to create a strong password with special characters. Frustrated with all of the complicated passwords that he has to track, Pat jots the password down on a post-it note, which he sticks to his computer screen—for anyone to find and use. What would you think if Pat was managing...

If PCI Is Your Whole Security Program, You’re Not Doing Your Job Right

For most CISOs, the pain of an audit is part of the job, but it doesn’t have to be the nightmare that most of the IT community envisions. While attending the SOURCE Boston conference last week, your faithful SecurityWeek correspondent attended a rather frank discussion centered on the pain of a PCI assessment, and why the said pain is completely unwarranted. Here’s a recap of the talk. Presented by Michelle Klinger, a Sr. Consultant with...

6 Steps to Acing Your Next Firewall Audit

Certainly we are no strangers to increased regulations, standards and internal policies, and the resulting audits that impact most organizations – often multiple times per year.  While regulations and ensuing IT audits go beyond firewalls and firewall policies, these devices are often a good place to start when it comes to becoming "audit-ready" and gaining continuous visibility of what's going on in your network.  Here are...

Senin, 18 Februari 2013

zeus banking trojan targeting five

Zeus continues to strike online bank accounts and users, and technology designed to thwart these Trojan attacks continually fails to keep up. Symantec recently came across a new Zeus file targeting five major banks in Japan. The malware, which has caused serious problems to banking customers in Europe and the U.S, now having maximum concentration on Japanese banks. Target information was reveled by Symantec after decryption...

Jumat, 15 Februari 2013

Ensure Your Network Is Secure

Twenty-four hours a day, seven days a week, 365 days each year – it’s happening. Whether you are awake or asleep, in a meeting or on vacation, they are out there probing your network, looking for a way in. A way to exploit you; a way to steal your data, a place to store illegal content, a website they can deface, or any of a hundred other ways to mess with you for the simple joy of it all. And they can do this with relative ease, even in...

The use of password in a technological

Every day we read about an incredible number of successful attacks and data breaches that exploited leak of authentication mechanisms practically in every sector. Often also critical control system are exposed on line protected only by a weak password, in many cases the default one of factory settings, wrong behavior related to the human component and absence of input validation makes many applications vulnerable to external attacks. Today...

Minggu, 03 Februari 2013

SID Retail Pro

Mau sharing tentang aplikasi SID Retail nih. Tulisan dibawah ini saya copas dari beberapa sumber di dunia maya. Semoga bisa bermanfaat dan mohon maaf sebelumnya.  SN 4690 : N605MCP-7WYND34-MFQ1V21-7328Z18 SN 4876 : 897FXJ5-97H296F-30O6G7S-05ZGRGT SN 10816 :  9G7YZ93-9SJ784D-A30F56P-40HP3FL SN 6277 : 497C8R1-W6J0L53-W39XU5B-57WU1X3 SN 7469 : U786F66-29UVS5H-6X42D9Q-8853GXO Download SID Retail Pro : https://mega.co.nz/#!V0ZlUYKY!Ie8M3lASF8pZQQD2JQkZgk5xSjxhd1v7F1PvnmezHwg (14.4 MB) Download Generate SN : https://mega.co.nz/#!hx4yybCY!Yg-vFHk9sdj-zdW--x4La2IpXs85I15aqpIZ794IQSI (608...