RSS
IT Glossary    1_9  A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z   .....  A  Б  В  Г  Д  Ж  З  И  К  Л  М  Н  О  П  Р  С  Т  У  Ф  Х  Ц  Ч

SYSTEM
 Windows10
  Registry Windows 10
  Windows 10 tweaks & tricks
Windows8
Tweaks & tricks
  Network settings
  Registry
Windows7
Windows7: General settings
  Windows7: Registry
  Windows7: Registry faq
  Windows7: Network settings
  Windows7: Security
  Windows7: Firewall
  Windows7: Compatibility Mode
  Windows7: Administrator Password
Windows NT/2K/XP/VISTAWindows NT/2K/XP/VISTA
Win 2K faqWin 2K faq
  Win 2K(kernel & MEM.managment)
  Win 2K и XP (Securit)
  Win 2K и XP (Boot)
  Win 2K и XP (Install)
  Win 2K и XP (Admin)
  Win 2K и XP (File system)
  Win 2K и XP (Services)
  Win 2K & XP optim & tweak
  Win XP faq
  Win XP faq #2
  Win XP faq (net)
  Win XP faq (lan)
  Win XP recover & recovery console
  WinXP & ntfs
  WinXP & game faq
  Win PE
  Win Vista
  Win Vista FAQ
  Win Server tweaks
RegistryRegistry
Reg WIN2K/XP faq
Reg WIN2K/XP faq #2
Reg NT/XP: Structure
Reg XP: Restore & backup
Reg XP: Costumize XP
Reg XP: Inet
Reg NT/XP: SAM
Reg: Inet & LAN
BIOSBIOS
BIOS faq
BIOS recover
BIOS #
computer ambulance
Hacks at Russian central bank have cost 2 billion rubles

Hackers in 2016 stole 2 billion rubles -- equivalent to $31 million -- from accounts that banks keep at Russia's central bank. The Bank of Russia confirmed the cyberattacks and the extent of the losses to CNNMoney on Friday.Hacks at Russian central bank have cost 2 billion rubles
(Read More... )

Hardware Bitcoin Wallet KeepKey Informs Users of Breach

KeepKey, a hardware wallet designed for the secure storage of bitcoin and other virtual currency, informed users on Saturday that the company’s systems had been targeted by a hacker on Christmas Day.
KeepKey founder Darin Stanchfield said the attacker activated a new phone number under his PIN-protected Verizon account and used it to hijack his email via its account recovery mechanism. The hacker then started resetting the passwords of accounts linked to the compromised email address, including the firm's Twitter account.
Hardware Bitcoin Wallet KeepKey Informs Users of Breach
(Read More... )

Mozilla to Kill Firefox for Windows XP, Vista in 2017

Support for Windows XP and Vista will be removed from Firefox, currently the last major web browser out there to still support the two outdated operating system versions.Mozilla to Kill Firefox for Windows XP, Vista in 2017
(Read More... )

OSCE Confirms 'Major' Cyber Attack

The Organization for Security and Co-operation in Europe, an international election and war monitor, said Wednesday it had become the latest global institution to suffer a "major" cyber attack.
The Vienna-based OSCE has its origins in the Cold War but after 1991 it expanded and now has 57 member states including the United States, Russia and Ukraine.
OSCE Confirms 'Major' Cyber Attack
(Read More... )

Tor Browser Patches Start Being Uplifted into Firefox

The Tor (The Onion Router) team and Mozilla are working together to implement Tor browser patches directly into Firefox and tighten their collaboration.
The Tor browser is built almost entirely on Firefox, with 95% of its code coming from Mozilla’s browser. However, it still needs a series of changes, which the team refers to as patches. As part of the strengthened collaboration, these patches are set to become part of Firefox, albeit they will be disabled by default.
Tor Browser Patches Start Being Uplifted into Firefox
(Read More... )

Google Researcher Finds Certificate Flaws in Kaspersky Products

Google Project Zero researcher Tavis Ormandy has discovered two serious certificate-related issues in Kaspersky Lab’s anti-malware products. The flaws were addressed by the security firm in late December.Google Researcher Finds Certificate Flaws in Kaspersky Products
(Read More... )

Google Patches 22 Critical Android Vulnerabilities

Released January 03, Google’s first Android Security Bulletin for 2017 patches a total of 95 vulnerabilities in the operating system, 22 of which were rated Critical severity. Over half (50) of the bugs addressed this month were Elevation of privilege flaws.Google Patches 22 Critical Android Vulnerabilities
(Read More... )

Bitcoins Surge Past $1,000

What a good start of the New Year for those holding Bitcoins! Web-based digital currency Bitcoin has passed $1,000 for the first time on the Bitstamp Price Index (BPI) since early November 2013.
Bitcoin broke the barrier on 1 January and now is trading above $1,020 at the time of writing, marking a bright beginning to 2017 for the digital currency.
Bitcoins Surge Past $1,000
(Read More... )

Critical RCE Flaw Patched in PHPMailer

The developers of PHPMailer have patched a critical vulnerability that can be exploited by a remote attacker for arbitrary code execution, a researcher said on Sunday.
With millions of installations, PHPMailer is considered the world’s most popular email creation and transfer class for PHP. It has been used by several major open-source projects, including WordPress, Drupal, 1CRM, SugarCRM, Yii and Joomla.
Critical RCE Flaw Patched in PHPMailer
(Read More... )

New "Alice" Malware Drains All Cash from ATMs

A newly discovered family of malware targeting ATMs (automated teller machines) has been designed with the sole purpose of emptying cash from the safes of the self-serve machines, Trend Micro security researchers warn.New "Alice" Malware Drains All Cash from ATMs
(Read More... )

Russia Used Android Malware to Track Ukrainian Troops

The Russia-linked cyberespionage group known as Fancy Bear has tracked Ukrainian artillery forces by planting a piece of Android malware in a legitimate military application, threat intelligence firm CrowdStrike reported on Thursday.Russia Used Android Malware to Track Ukrainian Troops
(Read More... )

Google Releases Crypto Library Testing Tool

Google this week announced the availability of Project Wycheproof, an open source tool designed for finding known vulnerabilities in popular cryptographic software libraries.
Developed in Java due to its common cryptographic interface, Project Wycheproof includes tests for the most popular crypto algorithms, including AES-EAX, AES-GCM, DH, DHIES, DSA, ECDH, ECDSA, ECIES and RSA. The more than 80 test cases developed by Google experts have led to the discovery of over 40 bugs in RSA, DSA, ECDH and DH.
Google Releases Crypto Library Testing Tool
(Read More... )

Ukraine Power Outage Possibly Caused by Cyberattack

A cyberattack may have caused the power outage that occurred in Ukraine late on Saturday, according to the country’s national energy company Ukrenergo.
In a statement published on its website on Sunday, Ukrenergo said the outage occurred on Saturday, near midnight, at the North (Petrivtsi) substation, causing blackouts in the capital city of Kiev and the Kiev region.
Ukrenergo Acting Director Vsevolod Kovalchuk said workers switched to manual mode and started restoring power after 30 minutes. Power was fully restored after just over an hour, Kovalchuk said.
Ukraine Power Outage Possibly Caused by Cyberattack
(Read More... )

Germany Accuses Russia of Hybrid Warfare

Russia has been accused of waging its own brand of cyber hybrid warfare against Germany, with specific focus on next year's elections. In particular, the APT28 (Fancy Bear) hacking group -- thought to be linked to the Russian government -- is accused of spreading propaganda and disinformation under the guise of 'hacktivists'.Germany Accuses Russia of Hybrid Warfare
(Read More... )

France Announces First Cyber-warfare Army Unit

France announced its first cyber-warfare army unit on Monday, aimed at increasing the country's hacking skills as concerns grow in Europe and the United States about Russian capabilities.
Defense Minister Jean-Yves Le Drian likened the impact of hacking on warfare to the effect of the first aircraft on conflicts in the early 20th century.
France Announces First Cyber-warfare Army Unit
(Read More... )

computer service


Stop-экраны: сообщения STOP появляются в случае, если ядро операционной системы выявляет противоречивое состояние, из которого оно не может выйти самостоятельно. Такие сообщения всегда отображаются в полноэкранном текстовом режиме, а не в окне Windows.
(Далее...)

Настройка безопасности в WIFI сети: многие устанавливают только что купленное WiFi оборудование в великой спешке, желая как можно быстрее получить доступ к высокоскоростному Интернету. Такое наплевательское отношение довольно тяжело понять, т.к. в дальнейшем это приводит к большим проблемам в сфере безопасности.
(Далее...)

DNS: частые вопросы и ответы DNS - это общие базы данных имён доменов и соответствующих им IP-адресов. Эти базы хранятся на серверах имён (или DNS-серверах, как их обычно называют).
(Далее...)

Зачем нужен файл ".htaccess". Cамый популярный веб-сервер - Apache. Одним из самых весомых преимуществ этого сервера (помимо бесплатности, быстроты и небольшого потребления ресурсов) является гибкость настройки.
(Далее...)

Recovery Console in Windows: Recovery Console is designed to help you recover when your Windows-based computer does not start properly or does not start at all.When you use the Win Recovery Console, you can obtain limited access to NTFS, FAT, and FAT32 volumes without starting the Win graphical interface.
(Далее...)

O монтаже: прежде чем начать разговор о монтаже, нужно привести несколько определений из кинематографического и телевизионного лексикона.
(Далее...)

RAID: создание RAID-массива максимально приближено к организации обычной дисковой подсистемы персонального компьютера. В основе такого массива могут лежать стандартные накопители на жестких дисках, что делает этот метод создания системы резервного копирования максимально доступным широкому кругу пользователей.
(Далее...)

God Mode in Windows 10: a hidden setting that creates a shortcut to Windows settings and tweaks, was a great thing to know about in Windows 7 and 8 but even more important for me in Windows 10.
(Далее...)

Как настроить локальную сеть: несмотря на то, что настройка локальной сети для домашнего пользователя, в принципе, не должна вызывать проблем, благо при желании всегда можно воспользоваться специальными мастерами создания сетевых подключений, присутствующими в последних версиях Windows, нередко возникают затруднения даже с такой, казалось бы, вполне заурядной операцией
(Далее...)

Брандмауэр на основе машины, подключенной к двум сетям: в отличие от маршрутизатора с фильтрацией пакетов, брандмауэр данного типа может полностью блокирвоать передачу трафика между Интернетом и защищаемой сетью.
(Далее...)

SMTP: основная задача протокола SMTP (Simple Mail Transfer Protocol) заключается в том, чтобы обеспечивать передачу электронных сообщений.
(Далее...)

Технология RTB: технология покупки и продажи таргетированной медийной рекламы в режиме реального времени.
(Далее...)
The bottom line
Ensuring that networks are secure and that compliance with regulations and industry standards can be achieved is a complex task for any organisation no matter how small or large. An organisation that tries to do everything itself will be in a constant state of catch up, which often leaves vulnerabilities exposed. As networks become increasingly open and inter-connected, with always-on availability expected from an ever-growing variety of devices, a far better strategy is to offload security needs that are either not a core competence or that are complex and costly to manage to a third party that has specialised expertise.

Магазин цифровой техники | Новинки магазина | Популярные товары | Bluetooth-адаптеры | Crystal Case | Flash-карты памяти | GPS-навигаторы | Hi-Tech гаджеты | MP3-FM Модуляторы | MultiSIM | WiFi оборудование | Авто видеорегистраторы | Цены на скупку новых картриджей. | Преимущества монтажа СКСАвто инвертеры | Автомобильные держатели | Адаптер для 2 SIM-карт | Аккумуляторы для телефонов | Аккумуляторы оригинальные | Акустические системы | Алкотестеры | В автомобиль | Внешние аккумуляторы | Гарнитуры стерео | Дата-кабели USB | Дата-кабели мультимедийные | Зарядки автомобильные | Зарядки сетевые | Зарядки универсальные | Защитные пленки | Защитные стекла | Инструменты | Кабели HDMI | Кардридеры | Кнопки для сотовых | Корпусы для КПК | Корпусы для сотовых | Корпусы оригинальные |  escort Lviv | Кредлы | Моноподы и селфи-палки | Наушники | Сотовые телефоны | Стилусы для сотовых | Столики для ноутбуков | Украшения | Чехлы и сумочки | Экраны и тачскрины | Как Яндекс и Google «смотрят» на сайты | На главную

Cookie policy | Sitemap

 

po gonn © 2004