Pro Corner

Security


Windows XP’s 6 month “End of Life” deadline

Windows XP’s 6 month “End of Life” deadline
Posted in Networking & Security & Technology on October 29, 2013 , by

Now that we are closing in on November, users of Microsoft’s Windows XP operating system now have six months left to act before Microsoft closes off all support, including Windows updates, to the now 13-year-old operating system on April 8, 2014. What does this exactly mean for consumer and enterprise-level users still using XP? Increased […]

Read More

How the web has turned into a virtual battlefield

How the web has turned into a virtual battlefield
Posted in Featured & Security & Technology on March 29, 2013 , by

A graphical representation of a DDoS-style attack on a target website. The internet is one of the modern world’s most utilized technologies today, with over 2 billion users accessing web content and services via computers and mobile devices every day. It now only makes sense that more and more nefarious individuals and organizations are utilizing […]

Read More

United States Constitution vs. Your Hard Drive

United States Constitution vs. Your Hard Drive
Posted in Featured & Security & Technology on July 14, 2011 , by

Data encryption is not like a wall safe or a key lock that is “physical per say” where we can require or subpoena a key. If we subpoena an individual they can plead the 5 amendment which protects a person’s right for self-incrimination.

Read More

Think about it: Trust-based marketing

Think about it: Trust-based marketing
Posted in Featured & Internet Marketing & Security & Social on March 4, 2011 , by

Trust plays a central part in consumers to overcome threats of security on the web. However, does the latest marketing trend of site seals actually diminish this threat or play a more active role of deception and sense of false security when it comes to consumers sharing personal information.

Read More

Exploited: The buffer overflow

Exploited: The buffer overflow
Posted in Security & Technology on February 7, 2011 , by

Many people ask, how do Hackers do what they do? How do they gain access to systems? Well basically they probe and prod until they find a vulnerability. The most common vulnerability is a buffer overflow of poorly written software. Remember most real hackers do not want to crash a system, they want control of […]

Read More

Categories

Here are some the categories & topics to help you get around.