Category Archives: Week 17

Why Facebook proxies are bad idea

Facebook become very popular. 40% of Americans uses every day. It is more than using google. So many companies and learning institutions blocking facebook, because it disturbs to woks or learn, but of course most enthusiastic facebook users whose really … Continue reading

Posted in IT Security, Week 17 | Leave a comment

Traveling Part ? 10 tips to protect your laptop from theft

These days, it seems that just about everybody uses a laptop or notebook computer to get work done away from the office or on the road. Unfortunately, the pervasiveness of laptop computing has made portable systems an easy target for … Continue reading

Posted in IT Security, Week 17 | Leave a comment

iPad security breach

This data breach isn’t that important regarding the numbers,  it is important because it revealed information about powerfull people like the mayor of New York, the White House Chief of Staff, DARPA related people and many others. Compared to Sony’s PSN … Continue reading

Posted in IT Security, Week 17 | Leave a comment

How to get people to use strong passwords

Now, lots of thing need password, but do everyone’s password easy and secure? The answer maybe is “NO”. This blog is about how to use strong passwords. There are several parts about it: “Strong passwords are easy to manage”, “The … Continue reading

Posted in IT Security, Week 17 | Leave a comment

Add Internet Explorer 9 features on your web site

I find out good site to add Internet Explorer 9 features on your web site. BuildMyPinnedSite.com site concrete steps, tools and examples how to build features and install to your Web sites. It is new Microsoft web site with useful tips for web creators.  There … Continue reading

Posted in IT Security, Week 17 | 1 Comment

Google fixed Android issues

For the ones that were affraid about the security vulnerabilities that Android has on Calendar and Contact Information, I have, actually Google has good news for them. This problem has been fixed in the version of Android 2.3.4 known as … Continue reading

Posted in IT Security, Week 17 | Leave a comment

Destructive behaviour

In this post I will talk about destructive behaviour in some cases of network vulnerabilities. Among the destructive sorts of break-ins and attacks, there are two major categories. Data Diddling. The data diddler is likely the worst sort, since the … Continue reading

Posted in IT Security, Week 17 | 3 Comments