|
|
Choosing a Web Host
These days, there are so many web hosting companies out there.
All of them offer roughly the same options, but what makes a
great web host? The indirect answer is that it depends on your
needs. The purpose of this article is not to discuss the...
StarForce Protection Solutions at Games Convention 2004
A famous Russian expert in the field of copy protection and software licensing presents its brand news technologies at Games Convention 2004, Leipzig.
StarForce to introduce its latest software protection and licensing technologies at Games...
The never ending Spyware story
It’s been with us since 1993, it’s gotten more intrusive, more complicated. It’s created a whole ecosystem, so to speak.
A person sits somewhere, writing a new virus, a new application of Spyware. It is put onto the Internet and Anti-Virus and...
UPS Technologies explained
Online Double Conversion Technology
An
uninterruptible power supply using
true online double conversion technology provides the highest level of power
protection available. The UPS converts the 230V input AC mains supply to DC power,...
Web Hosts: The Basics
Before you start searching for a web host, you must familiarize yourself with the terminology used in this field. The following terms are also considered key factors in deciding the suitable hosting plan that meets your requirements. You can start...
|
|
|
|
|
|
|
|
Cyber Warfare
In these days of all-out combat in Afghanistan, terrorist attacks in New York and Anthrax in Washington, it's easy to lose one's perspective. I know I've become addicted to checking the major news web sites several times a day. I now listen to the news radio stations on the way to and from work instead of my normal rock and roll station. It seems like something might happen at any moment, and I want to know immediately.
Something that seemed to be mentioned in every IT related publication for the last year or so is the possibility of cyber warfare. This is the concept of attacking a country through it's information systems (specifically the internet).
Since the attacks I've seen the number of articles go from a few per week dozens per day. Warnings about security risks seem to be popping up all over the place. It is important that these warning be taken seriously - it's time to wake up folks and get your systems locked down.
What could be attacked? Just about every company has an internet connection these days. Many of those companies do not have good security, as is proven by the recent Nimda and Code Red outbreaks, as well as numerous penetrations by hackers.
If you are an IT manager you probably need to ask yourself some important questions to be prepared for the possibility of attack. In fact, it is your patriotic duty to be sure your systems are safe and secure. To do otherwise not only puts your company in danger, it actually threatens, even in a small way, the security of your country.
Does your organization really need to be attached to the internet at all? - This is the first question to ask yourself. I know it seems like every workstation at every company must be attached to the internet, is it really necessary? Does it add to the company bottom line? For many companies, the answer is yes, for others no.
Is the information that you provide to the internet community appropriate? - This question has come up on a large number of government and utility sites. Is it really necessary, for example, to include a map of a power plant? I know this might seem useful to, say, schools for educational purposes, but it may also be even more useful to terrorists and other evil-doers.
Is your backup and archive strategy sound? - The most important single task that you perform is backups. Do them regularly and check the data occasionally.
Are your password policies good enough? - The weakest link in most security schemes is the user and his or her passwords. If your management will allow it, make sure your users have long, complex passwords which they change regularly. Enforce best practices with their passwords.
If your front line security adequate? - Have you got firewalls installed? Regardless of whether you've got a home computer or a hundred million dollar complex, you'd better install a firewall if you have not done so already. A hardware firewall is the best solution, but a software one will do for a home system if
money is tight.
Have you defined a DMZ? - If you manage a network for a company, you should reexamine your firewall strategy to ensure that you have a proper DMZ. What is a DMZ? To simplify it a bit, it's a way to protect your application servers even if your web servers are compromised. You have your core application systems behind a firewall. On the outside of that firewall you place your web servers. Then to protect them you put another firewall.
Is your virus protection adequate? - If you haven't installed antivirus software by this time, shame on you. It does not matter whether you run a network of ten thousand computers or a cheap home system, you'd better have this basic application not only installed, but regularly updating.
Is your system patched properly? - All vendors release software with bugs. It is the responsibility of all system managers to periodically review operating system and applications patches and releases and update them as needed. Remember, even the Apache web server is ridiculously insecure if not properly patched.
Are you educated on security? - If you haven't already, look around and find some books, classes or information about security. Become educated as fast as you can. Once you understand security, then propose, plan and implement what you have learned.
Do you perform background checks on IT related positions? - All new hires into IT should have thorough background checks before they are hired. You should also check the backgrounds of all of your IT consultants. It's best to know who you are hiring before you hire.
Is your user community educated about security? - Perhaps one of the best tasks you can perform is to educate your users on good security practices. Emphasize the reasons why security is important and how it protects your users. I usually stress that security penetrations are a direct threat to their employment. Spend some time explaining and demonstrating how social engineering works - this is the number one way break-ins occur.
Do you have a working disaster plan? - To be perfectly prepared, ensure that you have a working, tested, debugged disaster plan ready at all times. That way if for some reason your primary systems are rendered useless you can still have a running company.
Is your security plan confidential? - The less information you have available to evil-doers the better. Keep any information about how your systems are secured confidential - treat it on a need-to-know basis.
Remember this important fact. As of September 11th the United States and all of the free nations are in a war. And when your country is in a state of war you had better be prepared to be attacked. It's the only sane thing to do.
About the Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets at http://www.internet-tips.net - Visit our website any time to read over 1,000 complete FREE articles about how to improve your internet profits, enjoyment and knowledge.
|
|
|
|
|
Tom's Hardware |
: Tom's Hardware Guide is the Internet's premiere resource for hardware news and reviews. |
www.tomshardware.com |
  |
HardwareCentral - Your source for in-depth computer hardware info. |
HardwareCentral is the #1 Hardware Information Resource on the 'Net. Featuring over 600 pages of Hardware information, including advice on System ... |
www.hardwarecentral.com |
  |
Apple - Hardware |
Find your favorite Mac, iPod and other Apple accessories. |
www.apple.com |
  |
Ace Hardware |
Nationwide (United States) hardware and home improvement retailer. Includes products, dealer locator and corporate information. |
www.acehardware.com |
  |
Computer hardware - Wikipedia, the free encyclopedia |
The hardware of a computer is infrequently changed, in comparison with software and ... Personal computers, the computer hardware familiar to most people, ... |
en.wikipedia.org |
  |
Hardware - Wikipedia, the free encyclopedia |
Hardware is the general term that is used to describe physical artifacts of a technology. ... In a looser sense, hardware can be major military equipment, ... |
en.wikipedia.org |
  |
Open Directory - Computers: Hardware |
Hardware Central - Computing-centric community providing vital information, support, tools and interaction facilities for power computer users and ... |
dmoz.org |
  |
Microsoft Hardware – Home Page |
Learn about Microsoft mice, keyboards, desktop sets, webcams, media center peripherals, gaming products, fingerprint readers and presentation tools. |
www.microsoft.com |
  |
AnandTech: your source for hardware analysis and news |
Independent hands-on reviews of computer hardware such as motherboards, graphic cards, and CPUs. |
www.anandtech.com |
  |
hardware.com - Routers, switches, firewalls, servers, memory ... |
Supplier of new and refurbished networking hardware and approved and compatible network accessories. Located in the United Kingdom. |
www.hardware.com |
  |
Slashdot: News for nerds, stuff that matters |
From the article: "Although the news caused barely a ripple of reaction in the audience of software and hardware engineers, there are industry analysts who ... |
hardware.slashdot.org |
  |
InformationWeek HardwareTech Center |
Our hardware coverage ranges from mobile computers and PDAs to servers and supercomputers, and the infrastructure issues enterprises deal with every day. ... |
www.informationweek.com |
  |
What is hardware? - A Word Definition From the Webopedia Computer ... |
This page describes the term hardware and lists other pages on the Web where you can find additional information. |
www.webopedia.com |
  |
Google Directory - Computers > Hardware |
Hardware Central - http://www.hardwarecentral.com/ Computing-centric community providing vital information, support, tools and interaction facilities for ... |
www.google.com |
  |
Gifts: Unique Gifts & Gift Ideas at Restoration Hardware |
At Restoration Hardware, you'll explore an exceptional world of high quality unique gifts. Browse our products to find gift ideas & more at Restoration ... |
www.restorationhardware.com |
  |
HwB: The Hardware Book |
HwB provides you with circuits, pinouts, cable/adapter descriptions and other technical information. |
www.hardwarebook.net |
  |
Reg Hardware: Product News and Gadget Reviews from The Register |
More Gadgets Stuff. 5th December 2006 12:09 GMT. Author: Reg Hardware ... 27th November 2006 15:31 GMT. Author: The Hardware Widow ... |
www.reghardware.co.uk |
  |
red hat hardware compatibility lists |
hardware.redhat.com/ - Similar pages |
|
  |
TrueValue.com |
Here's our tip to hang strands of lights with ease. Jeanenne & Jim Tucker Plantation True Value Hardware Richmond, TX ... |
www.truevalue.com |
  |
A complete illustrated Guide to the PC Hardware |
A complete illustrated Guide to the PC Hardware, Logic and Architecture. 500 easy-read articles about the modern PC. Understand the basic architecture of ... |
www.karbosguide.com |
  |
|