• Skip to main content
  • Skip to primary sidebar
  • Skip to footer

securitywing

15 Ways to Stop DDoS Attacks in your Network

by wing

DDoS attacks

To stop DDoS (distributed denial of service) attack, one needs to have a clear understanding of what happens when an attack takes place. In short, a DDoS attack can be accomplished by exploiting vulnerabilities in the server or by consuming server resources (for example, memory, hard disk, and so forth). … [Read more...] about 15 Ways to Stop DDoS Attacks in your Network

How to Remove Annoying Facebook Virus

by wing

facebook virus removal

What is Facebook virus?Facebook virus is just like any other virus that gets installed in a computer when a user clicks on a link shared from his friends’ news feeds or shares. So, the two most common ways that can infect your computer from Facebook viruses are: … [Read more...] about How to Remove Annoying Facebook Virus

How to Respond to Network Intrusion Detection

by wing

When your intrusion detection system triggers an intrusion alarm, you need to respond quickly to minimize the effects of the intrusion. The longer it takes to respond the higher the chances that your system will be damaged severely. If you do not have proper plan and concepts of what you have to do when you detect or suspect an intrusion, you will only panic for nothing and … [Read more...] about How to Respond to Network Intrusion Detection

Top 10 PHP Security Tips

by wing

This is a list of  top 10 PHP secuirty tips that you can follow when developing your PHP based web applications. Restrict access to administrative page Most of the web based software have administrative page that is used to configure and to manage the software. When you install PHP based software, remember to change the script’s default directory name and also remove the … [Read more...] about Top 10 PHP Security Tips

How to Create SSH key login with PuTTY in Windows

by wing

public and private key generation with PuTTY key gen

Though it is always possible to login in your server using username and password, but you always remain vulnerable to brute force attack. You will always feel that someone may break your password and get privileged access to your server. Are there any better ways to make your server access more secure? The answer is positive. You can make your server access more secure by … [Read more...] about How to Create SSH key login with PuTTY in Windows

Top 10 Ways to Prevent Data Leak

by wing

Who wants to lose his sensitive and confidential data? The answer is everybody wants to avoid embarrassing situation and to keep his data safe. Fortunately, you can avoid losing your data by following a few tips. What you have to do it to remember the following tips by reading it 38 times. Yes you heard it right. … [Read more...] about Top 10 Ways to Prevent Data Leak

Top 10 RFID Security Concerns and Threats

by wing

Like any other security devices and mechanism RFID is not flawless. Despite its widespread application and usage, RFID poses security threats and challenges that need to be addressed properly before deployment. This post aims to highlight several important RFID related security issues. … [Read more...] about Top 10 RFID Security Concerns and Threats

32 Proven VOIP Security Best Practices

by wing

VOIP saves money if you can deploy and manage it properly, but there are certain risks that you need to take into account. As you know that VOIP is ip based voice solution and IP network is always vulnerable and point of interest to the intruders. … [Read more...] about 32 Proven VOIP Security Best Practices

Tips for Foreign Travel Risk Assessment and Management

by wing

You may be subject to intelligence espionage while you travel in foreign countries. There can be a number of reasons whey you can be a target. You can be government officials or may be a business person. If the intelligence agency in the foreign country thinks you possess valuable information, you can be a victim. This post helps you identify the clues that may suggest that … [Read more...] about Tips for Foreign Travel Risk Assessment and Management

12 Things to Remember when Handling Classified Information

by wing

When a piece of information is crucial and can cause serious damage to the national security can be considered classified information. Based on the severity of the damage, classified information can be categorized as top secret (if leaked can cause highest level of damage), secret and confidential (will not cause significant damage if confidential information get leaked). … [Read more...] about 12 Things to Remember when Handling Classified Information

List of Popular IT Security Standards

by wing

The good news for IT security professionals is that there are a number of IT security standards that they can use as a guideline when developing or implementing IT projects. Remember that these standards are well thought out and proven practices that can improve information security goals of your organization. Only the popular and globally recognized IT security standards have … [Read more...] about List of Popular IT Security Standards

« Previous Page
Next Page »

Primary Sidebar

Please help us sharing

Categories

  • AWS
  • Basics
  • Containers
  • Cryptocurrency
  • Cyber
  • Internet Security and Safety
  • IS Audit
  • IT Security Exams
  • Law & Human Rights
  • Network Security Tips
  • Off Track
  • Social Media Governance
  • Tech Comparisons
  • Tech Stack Suitability
  • Telecom
  • Tutorial

CISSP Sample Test

Take a CISSP Sample Test

CISA Sample Test

CISA IT governance Sample test

Please Follow Us

Contact us for Ads

Go to Contact Form

Search

Footer

Copyrights

Protected by Copyscape Duplicate Content Detection Software

Securitywing.com reserves the copyrights of all of its published articles.No contents of this site is permitted to be published to anywhere else in the Internet.If any contents are found in any other websites, securitywing reserves the rights to file a DMCA complaint. But you have the right to use the link of any relevant article of this site to point from your website if you consider that it might improve the quality of your article.

Tags

audit AWS backup basics browser check cisco cloud computer configuration cyber data database email gmail hsrp ids iis informaiton internet kubernetes linux load balancing malware microsoft network protection redundancy risk router security security tips server social media SSL switch test tools vpn vrrp web webserver website windows wordpress

Copyright © 2010-2025 ·All Rights Reserved · SecurityWing.com