Monday, November 24, 2008

How to select a CAAT

· 0 comments

How to select a CAAT

CAAT stands for Computer Assisted Audit Techniques


This is a common thing of discussion among IS Auditors is "which one is best - CAATs or Manual method of IS Audit". Sometimes manual method is not enough to find out effective and efficient IS Audit results. On the other hand in many instances use of CAATs gives less efficient results than corresponding manual IS Audit methods.

Read More......

IP Security & Authentication Header (AH)

· 0 comments

IP Security & Authentication Header (AH)

IP Security (IPSec) is a super set of protocols which to large extent ensure security of Internet Protocol (IP). Beside Internet Key Exchange (IKE) two other important protocol supported by IPSec are

1. Authentication Header (AH)
2. Encapsulating Security Payload (ESP)

Read More......

Monday, November 17, 2008

Access Control in UNIX based operating systems

· 0 comments

Access Control in UNIX based operating systems:

A lot of UNIX based operating systems are available. Although basic architecture is same for all these Operating System but they varies in functionality.

Read More......

Friday, October 24, 2008

Vishing

· 0 comments

Vishing like phishing is a socially engineered attempt to get your financial information. Unlike phishing rather than luring you to a website, it lures you to a phone number

read more

Read More......

Antivirus Plasma

· 0 comments

Antivirus Plasma is a faux security program that does not provide any additional security features or functions for your computer. As we thought, Antivirus Plasma is nothing more than another rogue application that performs various malicious actions to get computer users to purchase the Antivirus Plasma

read more

Read More......

Friday, September 26, 2008

Chrome Antics: Did Google Reverse-Engineer Windows?

· 0 comments

Since its release a few weeks ago, curious developers have been sniffing through the source code for Google's new Chrome web browser.

read more

Read More......

The Hacker's Voice Digest Issue - No. 3 Released Today!!

· 0 comments

Contents:# Rough guide to number stations - Part 3 By Demonix# History of BT Strowger Systems - By Belial# List of interesting phone numbers - Blue_Chimp# VoIP spectacular with 10nix and...# Hacking Vonage - Belial# Easy Peasy ID theift - Hyper# Urban Exploration - BT exchanges# Rants# News# Interviews# and a fuckton more!...

read more

Read More......

Top 5 Very Important Security Tests For Your Computer

· 0 comments

Until and unless you are not attacked by any virus or spyware you think that your computer security is very high but when your PC gets infected it is too late. So if you think that you have a good Internet security why not you go for some Internet Security Tests :

read more

Read More......

IDS – an Information security tool to protect your network

· 0 comments

How an Intrusion Detection System or IDS can help Network administrator, Information Security professionals, IS Auditors and Penetration testers for detection of any external or internal network intrusion(s)...

read more | digg story

Read More......

Thrown in the Fire - Database Corruption Investigation

· 0 comments

Analyzing an incident when the manufacturer claims that it's an operator error and the operator claims that it is an application error is one of the most daunting tasks of a security officer.

read more

Read More......

Blog to watch

CISA made Easy - Blog devoted for CISA

↑ Grab this Headline Animator

Ranking & Authority

View blog authority My BlogCatalog BlogRank DigNow.org Computers Top Blogs Top Computers blogs TopOfBlogs
Spottt
Spottt