Security
What are the best security strategies to use against winlock virus? A system was recently attack by winlock virus which edit the shell and userinit in the system window registry thereby leading to system malfunctioning. In implementing a security measure against winlock virus, what is the major system vulnerability that winlock virus exploit?
- 573 views
- 3 answers
- 0 votes
How possible is it that introducing certificates for mobile app would improve mobile security? Now that anybody can develop mobile app for various reasons and these apps are finding their way to the various app stores, how could introducing client certificate increase the security of mobile devices?
- 550 views
- 1 answers
- 0 votes
How do I make my browsing secure when am using public wi fi connection or networks? I recently found out that hen am in public using public networks (wi fi), window will put my connection in public thereby protecting some of my files, but this protection is really limited because someone was able to access my files while using the same public network. Is there any other ways to increase my privacy while using public networks?
- 803 views
- 2 answers
- 0 votes
Do I need to worry in installing apps on my mobile devices or not? Now that everything is going mobile, a lot of apps requires a lot of access to personal privacy. With many apps requesting free range of mobile permission, should I be concern or just trust that the data are in safe hand? Is there any supervisor for the data that this app developers has access to?
- 844 views
- 2 answers
- 0 votes
Which is better between hardware or software authentication? Now that security is the underlying priority of establishing an Info Tech infrastructure, what approach should a company choose between hardware and software in determining its authentication strategies? What are the diff between the two? In term of cost, which among the two is more economical?
- 566 views
- 2 answers
- 0 votes
How best can security strategies be implemented to allow willingness of users in coping with sometimes complicated security practices? With 2014 a year that record a lot of personal and corporate security breaches, ITs are planning of using complex and sometimes discrete passwords for individual accounts. How can this multilayered security approach improve the overall security of an organization?
- 518 views
- 1 answers
- 0 votes
How best can office 365 be secure efficiently and authentication methods are maintained? Now that the workplace is virtually mobile, securing mobile devices across many networks is increasingly difficult to achieve. What are the advance security options to use in office 365? What tricks and tips are available? How best can two factor authentications be set up?
- 836 views
- 1 answers
- 0 votes
Which of these security strategies: Biometric, certificates, non text passwords and signatures would best keep confidential and sensitive information safe? With increasing security breaches, threats and sophistication on the part of the attackers, which among these four (Biometric, certificates, non text passwords and signatures) should be used for organization protection?
- 818 views
- 2 answers
- 0 votes
Can phone home access restriction be used without internet connection? I tried to use phone home to restrict user in some system app without internet connectivity. The idea is to prevent any user without internet access from using most of the functionality of the app. I have tried some approach but the result is not what I desire. Is the idea feasible? What other approach can I use to achieve this idea?
- 587 views
- 1 answers
- 0 votes
what are the various ways to evade countries or individual censorship of some certain website? With the recent great China firewall blocking of Gmail and other Google services in China, many countries may be embolden to crack down hard on decedent or civil activists in their countries. What are the more secure ways in accessing internet without being notice?
- 587 views
- 2 answers
- 0 votes