The first rule of IT security is that you should never spend more to protect something than that thing is actually worth.
Hacker is a programmer who was particularly proficient at dealing with the intricacies of complex software.
hacking is felony.
each company must strike an appropriate balance between risk and company.
The best time for risk analysis(RA) is before you have been hit-not after.
The flip side of 99.9% of security is the 0.1% of vulnerability.
what u don't know can hurt you
hackers knows what u don't know
yesterday' strong crypto is today's weak crypto.
In the realm of information warfare,information is both the hacker's prize and your best means of defending it.
A firewall,quite simply is a device that acts as a buffer between trusted network and untrusted network.
The four main categories of firewall technologies are:
a)packet filtering
b)stateful packet inspection
c)application-level proxies
d)circuit-level proxies
Firewall is viewed as a first line of defence and not the total solution.
if a password is easy to remember then it's also probably easy to guess.
a cracker would have to be unbelievely unlucky if every passibility had to be tried to break a given password.
lopht employed hackers cracked 90% of the passwords in under 48 hours on a pentium II/300.
pardon me but buffer is overflowing.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment