There are many ways to deal with old computers. One popular way is to get rid of it. This is because old computers have no value, are slow and take lots of physical space.
The other way to deal with them is to sell them for a super low price so that you can buy a new one without paying too much. However, second hand electronic stuff does not really have any value. For instance, you probably ended up selling a graphic card for $50 that you bought for $200-$300 originally.
So why not keep your old computer and make good use of it.
Have you ever thought of what is going to happen when you are infected by a computer malware? About a decade ago, computer virus aims were to replicate themselves and destroying key operating system functions. If you got a computer malware infection at that time, most probably your operating system will be corrupted by the malware and you will need to format your hard disk to solve your problem.
Today, malicious software behaves a little different. We have more than 10 types of computer security threats such as virus, trojan, worms, spyware and many more. Each type of malware has their own speciality and here are top 3 risks of getting infected by a computer malware. Continue reading
About a year ago, I started blogging on a niche topic, hoping to earn some income from it just like many other bloggers out there today. However, nothing comes easy and I have been through a lot in that one year period. In this entry, I would like to share the pain when I started out, by telling you the five biggest mistakes I made.
1. Meaningless domain name
I started out by naming my blog and want to find a domain name as close as possible to the name of my blog. On top of that, I have the fear as well to have a long domain name because it is difficult to remember. As a result, I ended up creating a totally meaningless domain name which I still have the regret today. People find it hard to determine the niche of my site just by reading the domain name. The lesson learned here is to have a domain name which can represent your niche as close as possible. Continue reading
I had been a software engineer for at least 3 years specializing in digital security. A month ago, I attended a small workshop which talked about IT Security for corporate and the speaker said this somewhere in the middle of the workshop:
“Security is a process. It does not have to be really technical and the most important part is the process.”
I stunned for a while and suddenly my mind wondered away from the workshop deeply thinking, what is the speaker trying to deliver? I started this serious thinking simply because it is not said by some non-technical or sales person. Instead, the person speaking in front of me is a Certified Ethical Hacker.
At the end of the workshop, I begin to understand what he is trying to deliver. After 3 years of writing programs for the benefit of security, I turned out saying that security is a process. Why would I say that? Look around us. All the tech that you need to protect yourself from cyber crime is there. Anti-virus, firewall, anti keylogger, parental control, password manager and many more are all available in the software market. There is no reason for us to say in terms of technology, we are not good enough in security.
Whenever people talk about computer and internet security, they talk about malware which consists of virus, trojan, worms, spyware and many more. When they come to talk about the solution for those threats, the solution is to get an antivirus and firewall to do the work.
The question now is, are they sufficient for a good computer and internet security? I would say ‘No’. It is very irresponsible to put the blame into that awesome software when you become a victim of malware infection. I believe that software like antivirus and firewall are there to help you in achieving good security, but not creating some sort of plasma shield to you.
The reasons why you have a poor security
As I said, you can’t blame the software for being too poor as the reason that you to get infected. Part of the reason why you are infected can be several below. Continue reading
As we had discussed before, one-factor authentication is not sufficient in order to have good security. Especially when we talk about sensitive transaction such as banking transactions, it is not secure anymore today if it were done only using username and static password.
Two-factor has to come into the IT security field to ensure that the correct person is authenticated. The items below are the five most popular methods used for any two-factor authentication.
In the analogue world, we identify ourselves by our national identity card which consists of basic information such as name, address, date of birth, and a unique ID number.
However this cannot be done in the digital world. Whenever you go online, even your name is not commonly used for identification. What commonly used is the username and password and these two are the basic criteria of a one-factor authentication.
The one-factor authentication is also known as ‘something you know’. Today we have more than one factor when it comes to authentication and it is applied by using a software or hardware device as part of your authentication. This make up the second factor and it is known as ‘something you have’. There is also third factor which is still not popularly used is the third factor or also known as ‘something you are’. The reason of having so many factors in authentication is that the one-factor authentication is not sufficient for a sensitive transaction’s security. It is vulnerable to the traditional ‘Brute-Force’ attack that it is still useful today simply because computers today are extremely fast and it can even be done not only using CPU but also GPU.