-
Recent Posts
Recent Comments
Archives
Categories
Category Archives: Computer Security
Bluetooth Security
Abstract Bluetooth is one of the most widely used technologies used by various devices such as mobile phones, gaming consoles, laptop and computer peripherals. This article discusses about Bluetooth security, technology standards, security features, vulnerabilities and risks associated with using … Continue reading
Posted in Computer Security
Comments Off on Bluetooth Security
How to configure server
This tutorial provides you with a step by step configuration for a simple Linux server on how to configure server. Linux Fedora core server is chosen for this tutorial, however configuration for other distributions may vary. Fedora is free Linux distribution … Continue reading
Posted in Computer Security, Tutorials
Comments Off on How to configure server
Security policy development for SME
Abstract This article provides explanation for security policy development for small medium enterprises. Information security has three main goals which includes: Confidentiality, Integrity and availability. Donn parker has introduced an alternative to this model by adding three more principals including: … Continue reading
Posted in Computer Security, Information Technology
Comments Off on Security policy development for SME