Archives

SSH tunnel (proxy) setup using Putty(SSH client) to a Home router

You need an SSH tunnel There are many reasons to use it, if you're trying to create a tunnel you'll definitely have in mind (at least) one I am often confronted with the HTTP...

Basic Steps To Secure Network Infrastructure

Securing your network infrastructure is a process, not a task It is something that, once started, does not end You must remain constantly vigilant to the threats against your...

TrueCrypt A Freeware Encryption Program

Computer data is becoming unsecure and make the hacker more greedy In the same way protecting the data becomes more sensitive issue and essential in certain trades An...

Norton Ghost 2003 – Guide to Windows Restore

Norton Ghost 2003 is a power ful Windows backup and restore software Here I will list you a very easy way by which you can restore your entire system back along with your data,...

Virus under Linux and security

Linux is known as a secure system In fact, everything depends on the circumstances Absolute security is only available for a machine that is connected to any network and...
- Advertisement -
advertisement