• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

Internet Security and Safety

Simple Ways to Prevent Cyberbullying -What Parents Should Know?

by wing

A study conducted by UK based charity Beatbullying showed that almost 73% of the people knew who was sending them bullying messages. If you are a parent of a teenager, remember that cyberbullying is more common among teenagers and keep reading this post in order to get a few insights on protecting your kids from the cyber neurotics. … [Read more...] about Simple Ways to Prevent Cyberbullying -What Parents Should Know?

8 Open Source Web Application Security Testing Tools

by wing

Web application security testing might seems intimidating and esoteric to many web administrator, especially to the new ones. Have you ever asked yourself why so many IT professionals ignore the security aspects of the applications? We seem to have a tendency to ignore things that is unperceivable. You become concern when something breaks or any security breach occurs in our IT … [Read more...] about 8 Open Source Web Application Security Testing Tools

Android Security Issues and Prevention

by wing

This post about android security intends to give the Android users as holistic view of the phone security. Apps: since android is an open platform and anyone can write apps and publish it in Google apps, the apps itself can contain malicious which may steal data and sensitive tips from your phone. So, when installing any app, try to check if the app has any security issues. … [Read more...] about Android Security Issues and Prevention

What is Digital Certificate?How it Works?

by wing

how digital certificate works

A digital certificate is a way to confirm the identity of a public key owner. Normally, a third party organization, known as CA (certification authority), is responsible for confirming or binding the identity of a digital certificate owner. It is used to establish secure communication between two parties who are unknown to each other or have lack of trust. Digital certificate … [Read more...] about What is Digital Certificate?How it Works?

What is Digital Signature and How it Works?

by wing

how digital signature works

A digital signature is an electronic equivalent of a physical signature. Just like the way a signature in a paper authenticates the signer, the digital signature also confirms the authenticity of the owner. Besides, it ensures that integrity of the data and non-repudiation. Non-repudiation means that the sender cannot later deny that he did not send the message. So, if you have … [Read more...] about What is Digital Signature and How it Works?

Webhosting Security-Best Practices and Concerns

by wing

To many IT professionals, webhosting security means protecting websites from hackers and malicious codes. But most of the time we forget to consider that  websites security depends on a number of components such  as server , application , database, scripts etc. One of the most important aspects of webhost security is to ensure continuous operation and disaster recovery of web … [Read more...] about Webhosting Security-Best Practices and Concerns

Cloud Privacy Issues and Questions for Users

by wing

cloud privacy issues

Though various types of cloud are available to serve various types of customers,  they all serve the same purpose-offer IT resources and services to customers accessible via web browser.  The hardware and software powering the clouds always stay behind the customer’s eye-thus when we hear the term “cloud” it papers to some of us as an black box. The aim of this post to help you … [Read more...] about Cloud Privacy Issues and Questions for Users

Types of Backup-Difference between full, incremental and differential backup

by wing

differential backup

Data backup gives us a sense of assurance that our data can come back to online no matter what happens to our system. Whether you are a backup administrator or a IT auditor, having a clear understating of the backup types will help you develop a strong backup strategy for your critical data and system files. This post aims to distinguish the difference between the major types … [Read more...] about Types of Backup-Difference between full, incremental and differential backup

How to Check BlackListed IP of WebServer and Website

by wing

how to check blacklisted IP of webserver

The purpose of this post is to show a layman how to check if a IP is in the blacklist of white list. You may need to buy a webhosting plan  for your website, and after configuring your site you discovered that your site fails to deliver emails. If that is the case,  you need to check if the IP address assigned to your site by your hosting provider is in white list or black … [Read more...] about How to Check BlackListed IP of WebServer and Website

How to Control Directory Access with Htaccess and Htpasswd in Apache

by wing

htpasswd command

  Htaccess file is used to control access to directories in the web server. Normally, website administrators write htaccess file to put appropriate access control to files and pages stored in a specific directory. This method of directory access control is useful when you have a small number of users whom you want to give permission to view your contents. … [Read more...] about How to Control Directory Access with Htaccess and Htpasswd in Apache

Yahoo Mail Security Settings:How to Protect Your Account

by wing

accoung information

To secure your Yahoo mail account you need to block the doors that are easy for anyone to get access to your account. This post will help you to modify your account settings to make your mailbox  safer than ever. If you are a Yahoo mail user, then you are advised to use the following settings: Create a sign-in seal How to change password Monitor your account … [Read more...] about Yahoo Mail Security Settings:How to Protect Your Account

« Previous Page
Next Page »

Primary Sidebar

Please help us sharing

Categories

  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration cyber data database email gmail hsrp ids iis informaiton internet kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server social media SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com