Home Tags Security

Tag: Security

Is Your Website Secure?

0
Web applications are susceptible to various types of attacks from numerous directions. Hackers would love to gain unauthorised access to information. This is where...

The Importance of Heightened Security for Web Applications

0
With the Internet playing such a great part in our lives today, with more people engaging on social media, and with the dramatic increase...

Open Source Firewalls: The Best in the Business

0
Firewalls form a vital part of the network security system, isolating the network from all kinds of intrusions. This article discusses some open source...

How to Use ownCloud to Set Up a Secure Private Cloud

1
The power of the cloud makes for a level playing field between the big players and the smaller ones. Here’s a simple tutorial on...

Should software accept data without suitable checks?

0
The use of email in business is ubiquitous. Banks, commercial establishments and social media make use of email, either to communicate or as user...

The Impact of AI and ML on Cyber Security

0
Artificial intelligence and machine learning are changing the natural order of things—right from how we work and how the economy runs, to the nature...

Master Password App: A Safe and Random Password Generator

2
Passwords and PINs are the bane of modern day living. Passwords are sometimes forgotten and often they are hacked with disastrous consequences for the...

Securing Network Ports with Firewalld

0
Firewalld provides dynamic monitoring and management of firewalls in RHEL 7. It supports firewall networks or zones that define the trust level of network...

Blockchain Platform to Allow Interoperability and Privacy

0
R3 has launched a commercial version of its open source blockchain platform Corda to provide privacy and security solutions The launch of Corda Enterprise by...

Top Open Source Tools for Network Security: The Old and the...

2
Data security vulnerabilities can result in tremendous losses, damage to reputation, and even national security threats. In this article, we discuss the top open...