Sunday , April 27 2025 11:53 AM
Home / Security Guides

Security Guides

Antivirus Firm Kaspersky launches Its Own Secure Operating System

The popular cyber security and antivirus company Kaspersky has unveiled its new hack-proof operating system: Kaspersky OS. The new operating system has been in development for last 14 years and has chosen to design from scratch rather than relying on Linux. Kaspersky OS makes its debut on a Kraftway Layer …

Read More »

Why you SHOULDN’T “type Amen and share” posts.

If you’ve been on Facebook at all, you’ve probably seen those pleading posts, featuring a very sick child or a suffering animal. Often the posts also show a picture of Jesus, with a request for the viewer to take action. “Type Amen for this baby and share,” the post commands. “Keep scrolling …

Read More »

limit the amount of WIFI bandwidth roommate or bad office colleague uses?

Not all Internet traffic is equal. Streaming HD video or having a stutter-free Skype call is probably more important to you than downloading a big file. The Quality of Service feature on your router lets you prioritize the things you care about, so they happen faster than the things you …

Read More »

Best Password Manager

When it comes to safeguarding your Internet security, installing an antivirus software or running a Secure Linux OS on your system does not mean you are safe enough from all kinds of cyber-threats. Today majority of Internet users are vulnerable to cyber attacks, not because they aren’t using any best …

Read More »

Some Security Measures to Protect Your Servers

Introduction External and internal attackers day after day are menacing your networks. Many intelligent methods are discovered in order to get access and damage your server. Currently, the Sun Java system application server can’t be as beneficial as it was previously since the tactics used by those attackers are being …

Read More »

How to Protect Your Server Against the HTTPoxy Vulnerability

What Is HTTPoxy? On July 18th, a vulnerability named ‘HTTPoxy’ was announced, affecting some server‑side web applications that run in CGI or CGI‑like environments, such as some FastCGI configurations. Languages known to be affected so far include PHP, Python, and Go. A number of CVEs have been assigned, covering specific …

Read More »

Use Tor? Riffle promises to protect your privacy even better

Privacy-minded people have long relied on Tor for anonymity online, but a new system from MIT promises better protection and faster performance. Dubbed Riffle, the new system taps the same onion encryption technique after which Tor is named, but it adds two others as well. First is what’s called a …

Read More »

How to build secure Android application

App security issues With the maturity of mobile operating systems are maturing and App development process, security issues App to get more and more attention, a lot of security issues while App is exposed, among Android staggering, such as App decompiled placement, App easily get caught, simulation App crawling data …

Read More »

JAVASCRIPT VULNERABILITIES AND REMOVING PERSONAL METADATA FROM FILES

  Before I get into removing harmful meta data from your files, I want to talk about another vulnerability to our browsing capabilities called Javascript. In mid 2013, a person in Ireland was providing hosting to people that hosted hidden services including a secure email platform called Tor Mail. Unfortunately …

Read More »

WHOLE DISK ENCRYPTION AND FILE SHREDDING

Now that we have PGP figured out, hopefully, I want to remind you that using PGP whenever possible, is very very very important. One of the pitfalls of Silk Road 1, is that some of the administrators, including Ross himself did not always communicate using PGP encryption. Once Ross was …

Read More »