Cybersecurity

211

Solutions

22

Articles & Videos

523

Contributors

The Cybersecurity specialization covers the fundamental concepts underlying the construction of secure systems, from the hardware to the software to the human-computer interface, with the use of cryptography to secure interactions. Cybersecurity focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change, theft or destruction. This includes controlling physical access to the hardware, as well as protecting against harm that may come via network access, data and code injection, and due to malpractice by operators, whether intentional, accidental, or due to them being tricked into deviating from secure procedures.

Refine results

Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report …

022 views
Courses: Start Training Online With Pros, Today
Courses: Start Training Online With Pros, Today

Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

I'd like to move from our current P.O.S system and members database, to a cloud-based solution.

The company we’d like to use is ISO 27001 security accredited, they don’t store credit card info and …

639 views

One of the biggest threats in the cyber realm pertains to advanced persistent threats (APTs). This paper is a compare and contrast of Russian and Chinese APT's.

056 views

What software do you recommend for
Laptop "remote wipes" or "total lockdowns"
so data cannot be taken from the harddrive
when something like the below happens
in the FUTURE ?

I assume the …

1089 views

In my wireshark evaluation of a malware from a word document, I noticed that it makes an HTTP POST to a site.
The post packet contains information about my computer.  GUID, BUILD, INFO, IP, TYPE, …

221 views

Hi Guys

I am just wondering what extra could I do for my company from the security point of view.

We have onsite server, exchange online, firewall and analyzer on place, AV running on each wks …

950 views
Credit Card

A phishing scam that claims a recipient’s credit card details have been “suspended” is the latest trend in spoof emails.

057 views

Hi experts,
I know Office 365 security and compliance module already has something like this but it's not ideal... Clumsy to export and too much manipulating data to get the simple data i'm looking …

135 views
Technology Architects Testimonial

Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art …

014 views

Are any of you using an IRR (Incident Response retainer) to assist with Cyber incidents ? I am curious to know from others how well this is working for your organizations and if you feel there is good…

137 views
Gigs: Get Your Project Delivered by an Expert
Gigs: Get Your Project Delivered by an Expert

Select from freelancers specializing in everything from database administration to programming, who have proven themselves as experts in their field. Hire the best, collaborate easily, pay securely and get projects done right.

experts,

ON a windows 7 computer I run netstat and see established connections

Example:

proto    Local Address            Foreign Address              State
tcp        10.50.50.50:49198    …

336 views

Hi

Could you helpe me to understand something please.

How is possible that over one week my network at work made 16,355 connections?

For example 1969 widnows update connections how is …

872 views

A customer recently asked me about anti-malware and the different deployment options available for his business. Daily news about cyberattacks, zero-day vulnerabilities, and companies that suffered a …

0165 views

How do I trace an email address back to the IP address of computer it came from?

It's a yahoo email address ?

1360 views
Secure Portal Encryption

With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name …

010 views
PDF Encrypted Email

The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The …

09 views

Evening. I have a server that got infected with the file "Photo.scr" and its copied itself to every folder and subfolder on my drive M.
I am trying instructions of what I can find online but with no …

1946 views

My daily bandwidth repots show some IP addresses that are trying to access my systems

What tools (https://www.iplocation.net, https://www.ultratools.com/tools/ipWhoisLookup, etc) do you recommend …

4124 views

These days, all we hear about hacktivists took down so and so websites and retrieved thousands of user’s data. One of the techniques to get unauthorized access to database is by performing SQL injection. This article is quite lengthy which gives basic information about SQL injections

0441 views
Live: Real-Time Solutions, Start Here
Live: Real-Time Solutions, Start Here

Receive instant 1:1 support from technology experts, using our real-time conversation and whiteboard interface. Your first 5 minutes are always free.

Hi guys

I have noticed today on my weekly Firewall report botnet initiator. It is one connection from yestarday please see below



Could you help me what shuld I do ? is it false positive ? …

21115 views

experts,

I have a need to invoke YARA to search on a Yara rule that was published as an IOC.

What are some recommended ways to deploy Yara to a network of 1000 windows computers and then …

855 views

verizon fios residential internet so i am limited and do not want to create evil twin access

2 computers windows 10 both with wireshark installed

i want to see traffic from other devices …

859 views

I am looking for perhaps 5 opinions from different experts regarding security of bitlocker in win 10.

How would you rate the security of a portable drive with a password of 25 places?
1. Extremely…

1241 views

Experts,

I own two public CDIR blocks.

Let's say they are:

CIDR Block 1 - 100.100.100.0/24
CIDR Block 2 - 50.50.50.0/24

I see the same source IP from China doing a reconnaissance scan on …

436 views

How important is it to take extra precautions to protect your online business? These are some steps you can take to make sure you're free of any cyber crime.

0198 views
Show more content
201506-LO-Top-001

TOP EXPERTS

view all

RELATED TOPICS view all topics

  1. Security
    (23,345)
  2. Network Security
    (6,288)
  3. OS Security
    (21,511)
  4. Vulnerabilities
    (6,609)
  5. Encryption
    (6,926)
  6. Anti-Virus Apps
    (22,171)
  7. Networking
    (89,665)
  8. Delphi
    (59,047)
  9. Visual Basic Classic
    (163,615)
  10. Hardware Firewalls
    (23,305)