newbiznetwork.blogspot.com
Newbiz Network: Network Security Threats
http://newbiznetwork.blogspot.com/2009/11/network-security-threats.html
Sunday, November 1, 2009. The term virus has long been used generically to describe any computer threat, but in actuality it refers specifically to malware that inserts malicious code into existing documents or programs, and then spreads itself by various means. In addition to stealing personal information, maliciously-coded websites are also often designed for the following purposes:. Adware/ spyware/ reading cookies. XSS - cross- site scripting to utilize web browser flaws for other intentions. Brute-f...
newbiznetwork.blogspot.com
Newbiz Network: Wireless Security
http://newbiznetwork.blogspot.com/2009/11/wireless-security.html
Sunday, November 1, 2009. Overview of Wireless Technologies. As mentioned above wireless technologies, in the simplest sense, enable one or more devices to communicate without physical connections—without requiring network or peripheral cabling. Wireless technologies use radio frequency transmissions as the means for transmitting data, whereas wired technologies use cables. To simple devices such as wireless headphones, microphones, and other devices that do not process or store information. And Wireless...
newbiznetwork.blogspot.com
Newbiz Network: Computer Networks
http://newbiznetwork.blogspot.com/2009/11/computer-networks.html
Sunday, November 1, 2009. A computer network is a group of computers that are connected to each other for the purpose of communication. Networks may be classified according to a wide variety of characteristics. This article provides a general overview of some types and categories and also presents the ba. Sic components of a network. Obtaining status information on other network users and their status. LAN - Local Area Network. WLAN - Wireless Local Area Network. WAN - Wide Area Network. Es a central con...
newbiznetwork.blogspot.com
Newbiz Network: October 2009
http://newbiznetwork.blogspot.com/2009_10_01_archive.html
Sunday, October 18, 2009. IMAM and 3 ORANG SAHABAT. Imam and 3 Orang Sahabat. Di sebuah kampung ada 3 orang remaja yg suka melepak. Sorang tu nama dia Ali,. Sorang tu Budin dan sorang lagi Ciko. Aktiviti seharian depa ni. Menyebabkan tok imam tak senang duduk. Pada satu hari tok imam tu datang dengan. Niat nak tarbiyah depa ni. Maka berlakulah beberapa insiden cabar-mencabar. Tok imam tu cabar 3 orang sahabat tu ke surau waktu Maghrib nanti. Si Ali. Pun berkata, "Tok imam ingat kami ni jahil sangat ke?
newbiznetwork.blogspot.com
Newbiz Network: July 2009
http://newbiznetwork.blogspot.com/2009_07_01_archive.html
Tuesday, July 21, 2009. Perkara yang menjejaskan prestasi komputer. Kemungkinan selepas setahun kita menggunakan komputer, kita akan dapati terdapat beberapa perubahan yang ketara terhadap prestasi komputer kita misalnya selalu 'hang' ataupun operasi yang semakin lambat. Jika kita pengguna yang hardcore pula, masalah ini pasti berlaku lebih awal lagi. Berikut disenaraikan sepuluh perkara yang dirasakan menjadi punca kepada terjejasnya prestasi komputer kita. dan sepuluh perkara ini juga menja...Bagi cake...
newbiznetwork.blogspot.com
Newbiz Network: What Makes a Network Vulnerable?
http://newbiznetwork.blogspot.com/2009/11/what-makes-network-vulnerable.html
Sunday, November 1, 2009. What Makes a Network Vulnerable? Many points of attack—both targets and origins. Because networks enable resource and workload sharing, more users have the potential to access networked systems than on single computers. Perhaps worse, access is afforded to more systems,. So that access controls for single systems may be inadequate in networks. Subscribe to: Post Comments (Atom). Zul's Blog : Dawn of the new Security. RavGie Sesuatu - Rafizi. Network Security - paan.
newbiznetwork.blogspot.com
Newbiz Network: Network Security Controls
http://newbiznetwork.blogspot.com/2009/11/network-security-controls.html
Sunday, November 1, 2009. Encryption is probably the most important and versatile tool for a network security expert. We have seen in earlier chapters that encryption is powerful for providing privacy, authenticity, integrity, and limited access to data. Because networks often involve even greater risks, they often secure data with encryption, perhaps in combination with other controls. The SSH protocol involves negotiation between local and remote sites for encryption algorithm (for example, DES, IDEA, ...
newbiznetwork.blogspot.com
Newbiz Network: Advantages of a Network
http://newbiznetwork.blogspot.com/2009/11/advantages-of-network.html
Sunday, November 1, 2009. Advantages of a Network. A computer network is basically a connection of computers and resources like. Printers, scanners, etc. Here are some of the advantages. Networks offer a quick and easy way to share files directly. Instead of using a disk or USB key to carry files from one computer or office to another, you can share files directly using a network. Software Cost and Management. Even outside of the internet, those on the network can communicate with each other via electron...