Monthly Archives: June 2011
Top Ten computer security myths
I thought it is a good idea to make a list with the top ten popular beliefs but in reality misconceptions about home computers security, if you know more please let me know and I will re-entitle this article “Top Twenty computer security myths”. Failing to avoid these wrong ideas result in exposing your computer to a higher risk of infection with computer viruses, compromised online accounts and presumably financial loses. The most recent case was when somebody loses bitcoins worthing $500,000 from his account, due to a computer virus infection with a computer trojan. It was enough that only a single file, wallet.dat containing account informations to be stolen …
WOT (Web of Trust) — my review
Web of Trust, shortly WOT is a community driven system for websites ratings, aimed to help for a more secure and trusted web. The ratings components are : Trustworthiness Vendor reliability Privacy Child Safety The average of all these ratings forms a website reputation.This reputation system can be accessed through a browser add-on available for Firefox, Internet Explorer and Google Chrome, once downloaded and installed it will display next to the links a red circle for dangerous websites containing malware or scams, yellow circle for a questionable reputation and green for clean and safe websites. In this way the WOT users will know what websites to avoid and what websites are safe …
Computer security vulnerabilities
The security of an Windows machine has multiple lines of defense like a fortress and not surprisingly the first line of defense is our Internet browsers which are built with the security in mind. But, there was not yet produced a bullet proof computer program, although it becomes harder and harder to exploit an operating system or specific program vulnerability because the security patches are made available to the users quicker than before, this practice is widely used by the attackers and the browsers and their space are very often the “gate” for all kind of malware. First, at browser level are running a lot of third-party technologies aimed to …