|
Part of security maintenance is making sure that your software gets the latest updates. If you have a Windows computer, there is a great software package that will help you do this: Personal Software Inspector (PSI). For Windows users, I recommend that you download and install this program right away.
Secunia PSI inventories the software […]
If a software package is installed on your computer, some hacker out there has probably already figured out a new security vulnerability for that software. If the vulnerability is so new, that there is no patch to fix it, it is called a “zero-day” vulnerability. So, the best way to stay secure is… drum roll […]
The main reason to upgrade is that the newer versions of Windows and Mac OS X implement something called a security sandbox.
Suppose you get hungry, and want a recipe for a sandwich. So, you download some recipe software, install it, download a recipe for a sandwich, and make yourself a sandwich. If you accidentally […]
One way to improve your computer security is to ditch your old computer and buy a new one with new software. Why? Because computer security is like the arms race. Hackers are working to discover new software vulnerabilities all the time. If they find a good one, they may exploit it, or sell it to […]
First of all, you DID turn on encryption for your wireless network, didn’t you? If you wireless network is unencrypted, then anyone driving by can connect to your network, and try to steal information from your computers. (This is called wardriving. And, there is a newer version where the bad guys can do the same […]
Devices that provide hardware firewalls usually need to be configured. It may be that the default factory settings are OK, and you don’t need to do anything extra. But, it would be good to contact your ISP, and ask if they have instructions for configuring your firewall with high security.
For example, I just installed […]
Firewalls are filters that keep the most of the bad Internet traffic out. There are two types of firewalls: hardware firewalls (a separate box you plug in between your computer and the Internet) and software firewalls (software that you install on your computer). You should be using BOTH types, but this post focuses on hardware […]
I don’t know about you, but I don’t have any top-secret documents. But, suppose you use Quicken. Suppose you have a secret plan to become the world’s next billionaire. Suppose you don’t want the NSA prying into the photo collection of your, um, kids. Well, don’t connect your computer to the Internet.
Some people may […]
If you are hooked up to the Internet (at home, at a local coffee shop, at an airport, wherever), there is a constant barrage of Internet traffic trying to get to your PC. Hackers are trying to get into your computer. They might be in China, in Russia, in the US, in your own neighborhood, […]
Late last year in my work for Jibe Consulting, I detected a password disclosure issue with E-Business Suite R12, and reported it to Oracle. After I made sure that Oracle Support could replicate the issue, Oracle E-Business Suite Development worked the issue. The password disclosure issue has now been addressed in the July 2013 CPU […]
|
|
Recent Comments