|
|
Search Engine monopoly
Ever wondered how one search engine is dominating the entire web. In any business, you have so much stiff competition. Is there any business that you can start that has no competition ? Whether you decide to open a restaurant or a real estate...
Spyware Protection: A Must for Any Home Computer
Now that spyware is the single most dangerous threat to home computers connected to the internet today, getting your hands on some sort of spyware and adware protection is critical. Spyware has outpaced computer viruses in its prevalence, and in...
Top 5 DVD Tools You Can Pick Up For Pennies
1. Pocket DVD Wizard - Handheld Owners Rejoice! www.deprice.com/pocketdvdwizard.htm The Pocket DVD Wizard allows you to make backup copies of your personal DVDs, Mpeg, Avi and DivX® video and then play them on your Windows Mobile™ Pocket PC or...
What Can AutoResponders Do That Will Save Me Hundreds Of Hours?
What Can AutoResponders Do That Will Save Me Hundreds Of Hours? by James Mann http://www.inetstrategiesinc.com/ First let me say there is absolutely nothing wrong with responding to your email manually. I have family, friends and associates that I...
Whizlabs MCSD .NET 70-316 Certification Primer
Earning a Microsoft certification acknowledges your expertise in working with Microsoft products and technologies and sets you apart from the crowd as a development professional. Microsoft certification demonstrates that you have the ability to...
|
|
|
|
|
|
|
|
Cyber Warfare
In these days of all-out combat in Afghanistan, terrorist attacks in New York and Anthrax in Washington, it's easy to lose one's perspective. I know I've become addicted to checking the major news web sites several times a day. I now listen to the news radio stations on the way to and from work instead of my normal rock and roll station. It seems like something might happen at any moment, and I want to know immediately.
Something that seemed to be mentioned in every IT related publication for the last year or so is the possibility of cyber warfare. This is the concept of attacking a country through it's information systems (specifically the internet).
Since the attacks I've seen the number of articles go from a few per week dozens per day. Warnings about security risks seem to be popping up all over the place. It is important that these warning be taken seriously - it's time to wake up folks and get your systems locked down.
What could be attacked? Just about every company has an internet connection these days. Many of those companies do not have good security, as is proven by the recent Nimda and Code Red outbreaks, as well as numerous penetrations by hackers.
If you are an IT manager you probably need to ask yourself some important questions to be prepared for the possibility of attack. In fact, it is your patriotic duty to be sure your systems are safe and secure. To do otherwise not only puts your company in danger, it actually threatens, even in a small way, the security of your country.
Does your organization really need to be attached to the internet at all? - This is the first question to ask yourself. I know it seems like every workstation at every company must be attached to the internet, is it really necessary? Does it add to the company bottom line? For many companies, the answer is yes, for others no.
Is the information that you provide to the internet community appropriate? - This question has come up on a large number of government and utility sites. Is it really necessary, for example, to include a map of a power plant? I know this might seem useful to, say, schools for educational purposes, but it may also be even more useful to terrorists and other evil-doers.
Is your backup and archive strategy sound? - The most important single task that you perform is backups. Do them regularly and check the data occasionally.
Are your password policies good enough? - The weakest link in most security schemes is the user and his or her passwords. If your management will allow it, make sure your users have long, complex passwords which they change regularly. Enforce best practices with their passwords.
If your front line security adequate? - Have you got firewalls installed? Regardless of whether you've got a home computer or a hundred million dollar complex, you'd better install a firewall if you have not done so already. A hardware firewall is the best solution, but a software one will do for a home system if
money is tight.
Have you defined a DMZ? - If you manage a network for a company, you should reexamine your firewall strategy to ensure that you have a proper DMZ. What is a DMZ? To simplify it a bit, it's a way to protect your application servers even if your web servers are compromised. You have your core application systems behind a firewall. On the outside of that firewall you place your web servers. Then to protect them you put another firewall.
Is your virus protection adequate? - If you haven't installed antivirus software by this time, shame on you. It does not matter whether you run a network of ten thousand computers or a cheap home system, you'd better have this basic application not only installed, but regularly updating.
Is your system patched properly? - All vendors release software with bugs. It is the responsibility of all system managers to periodically review operating system and applications patches and releases and update them as needed. Remember, even the Apache web server is ridiculously insecure if not properly patched.
Are you educated on security? - If you haven't already, look around and find some books, classes or information about security. Become educated as fast as you can. Once you understand security, then propose, plan and implement what you have learned.
Do you perform background checks on IT related positions? - All new hires into IT should have thorough background checks before they are hired. You should also check the backgrounds of all of your IT consultants. It's best to know who you are hiring before you hire.
Is your user community educated about security? - Perhaps one of the best tasks you can perform is to educate your users on good security practices. Emphasize the reasons why security is important and how it protects your users. I usually stress that security penetrations are a direct threat to their employment. Spend some time explaining and demonstrating how social engineering works - this is the number one way break-ins occur.
Do you have a working disaster plan? - To be perfectly prepared, ensure that you have a working, tested, debugged disaster plan ready at all times. That way if for some reason your primary systems are rendered useless you can still have a running company.
Is your security plan confidential? - The less information you have available to evil-doers the better. Keep any information about how your systems are secured confidential - treat it on a need-to-know basis.
Remember this important fact. As of September 11th the United States and all of the free nations are in a war. And when your country is in a state of war you had better be prepared to be attacked. It's the only sane thing to do.
About the Author
Richard Lowe Jr. is the webmaster of Internet Tips And Secrets at http://www.internet-tips.net - Visit our website any time to read over 1,000 complete FREE articles about how to improve your internet profits, enjoyment and knowledge.
|
|
|
|
|
Tucows Downloads - Download Freeware and Shareware Software |
Download freeware, shareware, and demos. Maintains over 45000 software titles that are tested, rated, reviewed and ready to download. |
www.tucows.com |
  |
Free Software Downloads and Software Reviews - Download.com |
Download shareware, freeware and Demo software for PC, Mac, Linux, and Handhelds categorized into categories, plus software reviews. |
www.download.com |
  |
Computer software - Wikipedia, the free encyclopedia |
This includes application software such as a word processor, which enables a ... Application software is often purchased separately from computer hardware. ... |
en.wikipedia.org |
  |
Shareware.com - Search for shareware programs and free software ... |
Search for shareware programs from more than a dozen downloadable software directories. |
www.shareware.com |
  |
Jumbo: Free & Shareware MP3 files, Games, Screen Savers & Computer ... |
Source of free and shareware computer programs and utilities for PC and Mac. Evaluate software and read product reviews. Download games and screen savers. |
www.jumbo.com |
  |
Computer Software in the Yahoo! Directory |
Browse categories featuring sites devoted to computer software, including shareware and freeware download sites, operating systems, desktop customization, ... |
dir.yahoo.com |
  |
IEEE Software |
IEEE Computer Society's magazine covering all aspects of software, including software engineering. |
www.computer.org |
  |
Free Downloads on ZDNet | Shareware, Trialware, Evaluation Software |
ZDNet's Software Directory is the Web's largest library of software downloads. Covering software for Windows, Mac, and Mobile systems, ZDNet's Software ... |
downloads.zdnet.com |
  |
FSF - The Free Software Foundation |
Free software is a matter of liberty not price. Think of "free" as in "free speech". |
www.fsf.org |
  |
Apple - Software |
Software products for your digital life. ... The perfect addition for professional review. QuickTime Broadcaster. Encoding software for live events. ... |
www.apple.com |
  |
Open Directory - Computers: Software |
In Partnership with AOL Search. about dmoz | report abuse/spam | help. the entire directory, only in Computers/Software. Top: Computers: Software (38471) ... |
dmoz.org |
  |
freshmeat.net: Welcome to freshmeat.net |
About: The Web browser is probably the most frequently used software today, ... Web professionals can use the software for functional testing and regression ... |
freshmeat.net |
  |
Software - GNU Project - Free Software Foundation (FSF) |
Listing of the GNU software packages. |
www.gnu.org |
  |
Sun Software |
Get enterprise-class software--Solaris 10 OS, the Java Enterprise System, ... Sun Java StorageTek Software reduces cost and complexity with a single, ... |
www.sun.com |
  |
Internet Real Estate.com -- owns and operates a portfolio of the ... |
SOFTWARE.COM · SWEEPSTAKES.COM · PHONE.COM PODCAST.COM ... Software.com | Sweepstakes.com | Phone.com | Podcast.com | Shop.com | Safety.com ... |
www.internetrealestate.com |
  |
Joel on Software |
A weblog by Joel Spolsky, a programmer working in New York City, about software and software companies. |
www.joelonsoftware.com |
  |
Amazon.com Software: Computer & video games, business, accounting ... |
Online shopping for computer & video games, business & office productivity software, software from Microsoft, Apple, Adobe & more; accounting, antivirus, ... |
www.amazon.com |
  |
IBM Software - Home Page |
IBM home page for all of its software products, including Lotus and Tivoli, with keyword search, category browse and AZ product names. |
www.ibm.com |
  |
Opera web browser: Homepage |
Copyright © 2006 Opera Software ASA. All rights reserved. Skip navigation. Opera Software ... Copyright Opera Software ASA . All rights reserved. ... |
www.opera.com |
  |
Google Directory - Computers > Software |
Search only in Software Search the Web ... Software Categorized by Letter: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z ... |
www.google.com |
  |
|