Archives
SSH tunnel (proxy) setup using Putty(SSH client) to a Home router
You need an SSH tunnel There are many reasons to use it, if you're trying to create a tunnel you'll definitely have in mind (at least) one I am often confronted with the HTTP...
Basic Steps To Secure Network Infrastructure
Securing your network infrastructure is a process, not a task It is something that, once started, does not end You must remain constantly vigilant to the threats against your...
TrueCrypt A Freeware Encryption Program
Computer data is becoming unsecure and make the hacker more greedy In the same way protecting the data becomes more sensitive issue and essential in certain trades An...
Norton Ghost 2003 – Guide to Windows Restore
Norton Ghost 2003 is a power ful Windows backup and restore software Here I will list you a very easy way by which you can restore your entire system back along with your data,...
Virus under Linux and security
Linux is known as a secure system In fact, everything depends on the circumstances Absolute security is only available for a machine that is connected to any network and...