Now,we are ready to hack the websense.This will allow you to access the web even the websense is working in the network.You need to do the following steps.....
1)Install the mozilla web browser.
2)Go to 'Tools' tab.
read more...
Spiga
Saturday, November 29, 2008 at 9:04 PM Posted by SONU MISHRA
Now,we are ready to hack the websense.This will allow you to access the web even the websense is working in the network.You need to do the following steps.....
1)Install the mozilla web browser.
2)Go to 'Tools' tab.
read more...
Labels: Hacking, Web Browser security, websense 0 comments
at 8:08 PM Posted by SONU MISHRA
Credit Card,Internet And Hacking
In the previous article we came to know about the internet and the transaction security.In this article we will see the security of credit card payment through the internet.
Encrypted credit-card numbers aren't valuable enough by themselves, however, to pay for the compute time spent to attack them. A few years ago someone attempted to sell a large collection of valid credit-card numbers to an undercover FBI agent, who bought them for the modest sum of $2.50 per number. That price hardly justifies the effort needed to decrypt
read more
Labels: credit card, Security, Web Browser security 0 comments
at 7:43 PM Posted by SONU MISHRA
Are Web Transactions Safe?
In this cyber world,we do all the business,transaction like bill payment of the mobile,money transfer from one account to other and so many other works.But the question is that how safe is this transaction process.
Now-a-days anyone can buy a pair of small electronic devices that encrypt data sent between two computers across telephone lines. However, Computer A can only understand data sent by Computer B if both of these special devices share the same key. The first device uses the key to encrypt the data using the shared, secret key, while the second device uses that same key to decrypt the information, making it readable to the recipient.
Now comes an interesting question: When your browser encrypts and decrypts data that it shares with a Web site,
read more...
Labels: cypher, Security, Web Browser security 0 comments
at 6:21 PM Posted by SONU MISHRA
Labels: Security, Web Browser security, websense 0 comments
Monday, November 17, 2008 at 12:57 PM Posted by SONU MISHRA
Security Audit Log Is Full
The Event Log folder that contains this policy is available only in Group Policy objects associated with domains, OUs, and sites. The Event Log folder does not appear in the Local Computer Policy object.So we get this error message while login.To avoid this problem do following steps:
To enable auditing of security related events:
1. | Open the applicable Security Policy. |
2. | Expand Security Settings. |
3. | Within Security Settings, expand Local Policies to reveal the Audit, User Rights Assignment, and Security Options policies. |
4. | Click on the Audit Policy object. The right-hand details pane will reveal the configurable Audit Policy settings |
Labels: Microsoft security, Security 0 comments
Saturday, November 15, 2008 at 12:44 PM Posted by SONU MISHRA
Websense
Websense is a internet access management system that allows an organization to monitor, report and manage internal Internet use and to prevent misuse of internet from the organization.
Websense is a San Diego-based company specializing in Web security gateway software. This enables client businesses and governments to block user access to chosen categories of website. company says it is the global leader in its field. It has come under criticism from civil liberties groups on the grounds that it assists repressive régimes to restrict freedom of speech.
Labels: Security, websense 0 comments
at 12:23 PM Posted by SONU MISHRA
Evaluation Methods for Internet Security Technology (EMIST)
The main objective of the NSF/DHS-sponsored EMIST (Evaluation Methods for Internet Security Technology) research initiative is to develop scientifically rigorous testing frameworks and methodologies for evaluating approaches to large-scale network defenses. Their goal has been to expand the rigor with which we model the protection claims of malware defense algorithms, particularly as we design the metrics that will be used to evaluate and compare competing malware approaches. To this end, we consider how to more rigorously express defense specifications, formally validate or refute desired properties of these systems, and employ simulation and emulation experiments to fully stress algorithm performance. So,this technology is going to be one of the strong soluton for security.
Labels: Security 0 comments