Skip to content
excITingIP.com

Tech Blog & Business Insights

 Menu
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map
  • Home
  • Advertise
  • My Books
  • Video Creation
  • Site Map

Category: Network Security

Flame Virus (Worm) – Some good resources to read to know more

  • Rajesh K
  • June 4, 2012June 5, 2012

Many of us might be familiar with Stuxnet, a major worm that was discovered in the Iranian nuclear facility. More recently the news about another major worm called Flame discovered...

Computer and Network Forensics – An Introduction

  • Rajesh K
  • April 28, 2012

Computer/Network Forensics is about finding out and collecting information about an online attack/security breach and presenting it in a way that is permissible in a court of law. Should IT...

What can Spyware do and How can one Protect against Spyware?

  • Rajesh K
  • March 5, 2012March 5, 2012

In the Internet era, one doesn’t have to physically access a phone line to tap communications and spy on others. They just need to incite someone to install a piece...

Botnets – What are botnets, what can they do & how to protect against them

  • Rajesh K
  • January 21, 2012January 22, 2012

Botnets are automated computer programs that install themselves on many unsuspecting victim machines and launch coordinated attacks against target systems. Spam bot is a type of botnet, but there are...

What are Network/ Internet Worms & A short story of Stuxnet

  • Rajesh K
  • October 22, 2011October 23, 2011

In this article, let us look at what computer worms are, some techniques used by them to infect systems, what they can do and how they spread. But before that,...

What is a Trojan Horse in Computer Networks and how to protect yourself from it?

  • Rajesh K
  • September 28, 2011September 28, 2011

A Trojan Horse is a computer program that is attached to a genuine program / gets disguised as a genuine program to install a back-door to the user computer (enabling...

What is – MAC Address, MAC Filtering, MAC Spoofing

  • Rajesh K
  • July 28, 2011July 28, 2011

MAC Address or Media Access Control Address (physical address/ hardware address) is the permanent address embedded in NIC (Network Interface Cards) and Wireless Adapters. In this article, you can read...

Why is an SSL Certificate required?

  • Rajesh K
  • July 16, 2011July 16, 2011

An SSL Certificate might be required mainly for two reasons – 1. To validate the identity of a website / portal using digital certificates; 2. Encrypt communications between server and...

What do you think of accessing blocked sites & hiding IP address using personal VPN services?

  • Rajesh K
  • July 8, 2011July 8, 2011

If you are a network admin, you might be aware of the various techniques used by students/ employees to gain access to blocked sites. Right from typing IP address instead...

What are Database Firewalls, why are they required & how do they protect databases?

  • Rajesh K
  • May 26, 2011May 27, 2011

Most of the front end applications rely on a back-end database (like MySQL, PostGRE SQL, etc) to fetch the required data while performing their tasks. Databases are no longer restricted...

What is a Web Application Firewall?

  • Rajesh K
  • April 29, 2011April 29, 2011

Web Application Firewalls are quite different from normal packet inspection firewalls because they primarily operate in the application layer identifying and protecting web based applications/ servers from specific application based...

DLP – Data Loss Prevention : What & How Data Loss is Prevented?

  • Rajesh K
  • April 6, 2011April 7, 2011

With so many ways/ devices to transfer data, it is becoming difficult for companies to track and prevent confidential documents/ files from being copied and sent to unwanted sources. But...

Two Factor Authentication with USB Tokens

  • Rajesh K
  • March 16, 2011March 16, 2011

In this article, we’ll see what is two factor authentication and how USB tokens enable two factor authentication. We’ll also look at the advantages, and innovations that some vendors have...

An Introduction to DDoS – Distributed Denial of Service attack

  • Rajesh K
  • March 15, 2011March 15, 2011

As you might have heard, the famous blogging service WordPress.com was recently unavailable for around an hour due to a huge Distributed Denial of Service attack carried out by many...

Rajesh K's Intellifluence Influencer Badge

(c) 2009 to Now by excITingIP.com Masonry Blog, WordPress theme by Perfectwpthemes