*Parallelized* Data Mining (PDM) Security

Parallel Data Mining is currently attracting much research. Objects involved with ‘Parallel Data Mining’ include special type of entities with the ability to migrate from one processor to another where it can resume / initiate its execution. In this article we consider security issues that need to be addressed before these systems in general, and […]

Online Safety: Things to Do & Things to Avoid

Either it is a battlefield or a football field, there are always certain safety tips given to people before going anywhere, & it is recommended to follow them all. In the same way, for your Online Safety, there are things that you should know before you go Online Things to do: Use a combination of […]

Understanding IP datagram – the easy way

It is important to understand the information which is presented in an IP Packets as it helps you understand how the integrity of the information you send across a local network or the internet can be compromised. Mainly IP datagram has two components: the header and the payload. The Header contains addressing and control fields […]

Learn to Love your Log files

Yes! Learn to Love your Log file, it tells everything you want to hear. Even a Clever thief always leave his fingerprints anywhere at the crime scene, in the same way most of the malicious exploit and intruders leave their fingerprints or say footprint all over the Log file. If the log file management system […]

Protecting Removable drive against malware

Today one of the fastest medium used by malware for infection is removable drives. Worms used it to replicate faster, once your removal drive come in contact with infected system it gets infected automatically by the malicious services running in system, one of the first task done by malicious services is to create AUTORUN information […]

Cracking wireless Network WEP protection

Stuffs required: A compatible wireless Adapter: There are lots of compatible wireless adapter available, but what you need to care about is the size of your Pocket or say your budget. One can easily go for a good Alfa adapter that is easily available in Amazon but I’ll recommend going for AirPcap Adaptor which I […]

Build your own Web Proxy in 10 Easy Steps

With the emergence of World Wide Web threats of Identity theft is greatly increased, now people instead of using traditional mail started using Electronic mail as default mode of communication, instead of using cash to buy needed stuffs they started using Credit Card online to buy whatever they wish. This made everything vulnerable to theft […]

Microsoft’s released six security updates

Microsoft’s released six security updates and re-released one for this month. • MS07-055 – addresses a vulnerability in Windows (KB 923810) Vulnerability in Kodak Image Viewer Could Allow Remote Code Execution Severity Rating: Critical MS07-056 – addresses a vulnerability in Windows (KB 941202) Security Update for Outlook Express and Windows Mail Severity Rating: Critical • […]