skip to main | skip to sidebar

Counter-Interference Force

Security ... think about it!

I should be able to resume posting shortly.

Video: Three Natural Laws of Security is currently unavailable. Seeking new hosting site.

2010-03-07

The cyber criminals operate by hacking into the company's computer systems and then creating chaos by encrypting their data. They follow up with demands for money for the information on codes required to release the information blocked by the encryption. In one case, a company reported that the hackers had issued a demand for $700.
Posted by rlssec
Newer Post Older Post Home

Video

  • Three Natural Laws of Security

Free Computer Security Measures

  • List of (mostly) free tools (some dangerous if misused)
  • Zone Alarm Firewall
  • Hushmail
  • Eraser
  • CrapCleaner - MRU Eraser
  • Spybot S&D via Download.com
  • Avira Free Personal Anti-virus

Blog Archive

  • ►  2012 (130)
    • February (63)
    • January (67)
  • ►  2011 (721)
    • December (46)
    • November (30)
    • October (50)
    • September (55)
    • August (7)
    • July (53)
    • June (69)
    • May (73)
    • April (70)
    • March (101)
    • February (58)
    • January (109)
  • ▼  2010 (1371)
    • December (133)
    • November (127)
    • October (83)
    • September (87)
    • August (79)
    • July (33)
    • June (71)
    • May (149)
    • April (158)
    • March (169)
    • February (143)
    • January (139)
  • ►  2009 (1213)
    • December (120)
    • November (146)
    • October (149)
    • September (67)
    • August (82)
    • July (119)
    • June (118)
    • May (184)
    • April (228)