Archive
Can Hook based anti spyware work against kernel based keylogger? What is the difference between hook based keylogger and application programming interface (API) based keylogger? Which is more powerful, kernel based or hook based keylogger? If a network administrator want to use keylogger on the network, what keylogger should he use? What is the best protection against kernel based keylogger?
Read moreWhat is the best, easy to use, economical protection strategy against ‘Stingray’ surveillance system? How can someone know if Stingray or any controversial surveillance system is collecting personal and sensitive record on a cell phone or any other radio devices? What distinctive features should one look out for in an area that one suspect of some clandestine surveillance activity is going on?
Read moreWhat is the major difference between worms, virus, malware and Trojans? Which is the most dreaded? What security and personal strategy are best in fighting viruses, Trojans and worms? Can a system be infected without access to external networks (For example Internet)? What measure should be used in case of infection?
Read moreWhich disaster recovery plan software should we use? Our organization is planning of implementing a new disaster recovery strategy and I was task in finding out the best strategy to use, a friend inform me about KingsBridge Shield which is an online hosted disaster recovery planning solution, but I have my doubt. Is KingsBridge Shield the best disaster recovery plan software out in the market? What are its limitations?
Read moreWhy am I having problem backing up my Linux server to File transfer protocol (FTP)? I recently created a back up of Linux server using Handy Backup but uploading to the FTP is the real challenge. A friend said I should back up the Linux server to Image but my problem is how to create the image. If the image is created, can it restore through the network?
Read moreWith the recent revelation about Git open source development tool vulnerability identified as CVE-2014-9390, what option do I have to stop the attack from hackers? If an attack creates a malicious Git tree that cause Git to overwrite its own .git/config file when cloning, how do I restore? Is Linux OS also, open to this vulnerability?
Read moreWhy is my Mac laptop not recognizing my iPod touch? I was synchronizing my iPod touch with my Mac Laptop, after I finish sync and I try to eject the iPod from my Mac, the Mac won't eject the device. I later force the ejection by shutting down the Mac system. Later, when I powered on the Mac and plug the iPod, the Mac stops recognizing the device. What is the cause of this behavior? How can I fix the problem?
Read moreWhat is the major difference between WebApp and conventional app? A lot of funding is going into the development of web app today, why should a large corporation choose webapp instead of conventional app? What specific challenges does webapp overcome that conventional app can not? Talking security, is webapp more secure than conventional app?
Read moreWhich is better for SMS extension Jeema, SPC or any other? I need a Short messaging service extension on my Joomla website, but am confused as to which one to use. What are the advantages and disadvantages of Jeema and SPC? What other SMS extensions are better than these two?
Read moreWhy is the keylogger I install on my personal computer not working properly? I upgrade my keylogger software after the release of the new version, but since the keylogger fails to work since. I later found out the two keylogger was installed on my system, can I uninstall the previous version without uninstalling the updated version?
Read more