» 2008 » December » 04
-
Information SecurityBy admin on December 4th, 2008 | No CommentsPart I: Crypto - Crypt Basic - Hash Function … Part II: Access Control - Authentication - Authorization Part III: Protocols - Real world security protocols … Part IV: SoftWare - Insecu...
-
iBusiness Promoter ReviewBy admin on December 4th, 2008 | No CommentsIf you’ve ever worked on web sites doing everything by hand you know what a huge time-sink it is. Long ago I used to write all my sites with notepad and everything else was done manually. Wit...
-
Countering the Spread of Spyware on your ComputerBy admin on December 4th, 2008 | No CommentsSpyware has boomed into the top internet threat in no time and it continues to affect more computer users each day. Spyware is best described as a rogue application that latches to your system so i...
-
Corporate Promotional Gifts - The Fridge Magnet Is De...By admin on December 4th, 2008 | No CommentsCorporate promotional gifts come in all shapes and sizes. They can range from the very common personalized pens, calendars, mugs, caps and fridge magnets to very sophisticated company branded softw...
-
Coping with a Serious Data Loss from your Computer Ha...By admin on December 4th, 2008 | No CommentsData loss is an expensive reality. It’s a hard fact that it happens more often then users like to admit. A recent study by the accounting firm McGladrey and Pullen estimates that one out of e...
-
Computers - You CAN Master Any ProgramBy admin on December 4th, 2008 | No CommentsThere was a time when I didn’t think I’d ever be a “computer” person. I was in the seventh grade, taking a class in MS-DOS and learning some program called Turtle. (I know w...