Simple Tips Maintain Site Security

Here are some simple tips that are strongly recommended to maintain the security of your own site.

- Security Mindset

We should agree that the cornerstone of all our activities on the internet, revolve around security issues, so as not conceded. Because all your hard work could be wasted if one day your site suddenly disappeared due to hackers hoax. Experts had already declared that no matter the safest in the world of the Internet. So do not take for granted about the safety of your website.

- Always update to latest version

For the user content management system (CMS) open (open source) such as WordPress, Joomla, etc., are strongly encouraged to diligently update to the latest version. Wordpress users, make sure you are updating to WordPress 2.8.2. While the latest version of Joomla is 1.5.14.

Be careful for the company, the Security Gap via Social Networking.

Important for businesses to change their mindset. Especially in security issues, to ensure network and important company information can be protected from security threats continue to evolve. Area of network security continues to change with the many changes that occur, such as increased use of social networking and also the growth of mobile device usage to connect with the network.

Mid-year Security Report 2010 from Cisco: Important discoveries
Central Great Pergesaran Happen - The great strength in the business world was changing security landscape of their company. Social networking, virtualization, cloud computing, and high dependency on mobile devices increasingly have a significant impact on the IT department, to manage network security. To be able to cope with the changes that are happening this trend, companies must:

Security Papers (ericsson)

As mobile phones increasingly become the target of propagating malware, their use of direct pair-wise communication mechanisms, such as Bluetooth and WiFi, pose considerable challenges to malware detection and mitigation. Unlike malware that propagates using the network, where the provider can employ centralized defenses, proximity malware can propagate in an entirely distributed fashion.

Proceedings of the 28th Annual IEEE Conference on Computer Communications (INFOCOM'09), Rio de Janeiro, Brazil, April, 2009.

Defending Mobile Phones from Proximity Malware

Gjergji Zyba, Geoffrey Voelker, Michael Liljenstam, András Méhes, Per Johansson

Ericson's mobile paltforms Security

Conclusion
Ericson's mobile paltforms contain a variety of security mechanisms and an advanced model for issuing and checking the integrity of software.Manufacturers of mobile phones can thus build secure applications and a secure process for issuing platform software. Apart from communication security and basic platform integrity control, mobile phones developers can decide how and when they want to use these mechanisms. Therefoe, additional security mechanisms might be needed.

The mobile platforms do not use an open software environment that permits end users to install new software modules or applications. This limits the need for further software-protection mechanisms. In the future, however, we might see a more PC-like situation, Where new native software, such as non-java Software, can easily be installed adn executed. In that case, non-trusted software will have to be isolated from trusted software. Advanced operating systems isolate non-trusted software in such a way that it is never allowed to interfere with the execution of trusted software. In a large and flexible OS, however, isolation is difficult to achieve. Therefore, others means, such as hardware mechanisms or more stringent security requirements (in the OS) will have to be employed.

(Full article at ericsson review, 2. 2006, Mobile Platform Security, page.59-70)

Securing Wireless

Several events and activities being undertaken to Secure wireless networks, among others:
1. SSID Hiding

2. Wireless security with WEP key
WEP is a standard security & encryption first, that is used on wireless. WEP has many weaknesses.

3. Only with a key wireless security WPA-PSK or WPA2-PSK
WPA is a security technology that was created to replace the temporary keys WEP. To prevent any attacks against wireless security using WPA-PSK, use a passphrase that is long enough (one sentence).

4. MAC Filtering
Almost every wireless access point or router MAC facilitated with security Filtering. This is actually not much help in securing communications wireless, because the MAC address is very easy dispoofing or even altered.


How To Eradicate Virus in flashdisk

Steps:
1. Open your flash in the Address bar, in Mycomputer. (How to safely prevent the virus running).

2. Go to start> run> Cmd
3. Type flasdisk address.

The next step, see the following youtube video:
http://www.youtube.com/watch?v=qdiF-8LRySg

How to remove a virus on flash-disk using Ubuntu Linux

You often use the flash-disk. Sure to be careful with the virus. Very often through falsh-disk, the computer can be infected by viruses. If flas-disk, there is one already infected with a virus potent enough fatherly way to remove virus from flash-disk. But unfortunately that is required is OS ubuntu. With Ubuntu we can remove existing viruses, falsh disk preformance. How?
See youtube video below:
http://www.youtube.com/watch?v=nzg7trP6mXI

Password Thieves virus, drill Facebook

The hackers have been flooding the Internet with "spam" contaminated with a virus, targeting as many as 400 million users of Facebook, in an attempt to steal banking passwords and other sensitive information collected.

Electronic mail tells recipients that the password on their Facebook accounts have been reset, and urge them to click "attachment", in order to obtain permission new "login" , explains the software maker McAfee Inc., anti-virus.

If "attachment" was opened, then some kind of malicious software will be downloaded, including a program that steals passwords, McAfee said.

New Virus, Beware

A new virus has been found, by micrsoft referred to as the most destructive. The virus is found in McAfee, and have not found the vaccine to beat it.

This destructive virus Sector Zero from the hard disk that stores important information function.

This virus runs as follows:
This virus will be automatically sent to all the names in your address list with the title: "A Card For You" (Une Carte Pour vous or A Card For You)

Once the virtual card is opened, the virus that will freeze the computer so that the user must start over again, if you hit CTRL + ALT + DEL or command to restart, the virus that will damage the Boot Sector Zero from the hard disk, so that your hard disk will be permanently damaged.

PC Protection

Security in Internet surfing should always our attention. Especially for users of Windows, which is famous for its various security gap problem. Viruses, spyware adware etc, has always been a major problem in computer security.

Always update your anti-virus is a liability. Always alert in Internet surfing, a necessity. Never self-propagating privacy on the Internet. Always make sure the safe in the internet. Some things about the security that must diperhatika PC are:

1. Virus
2. Hack
3. fraud
 
© 2009 Mysecurity | Powered by Blogger | Built on the Blogger Template Valid X/HTML (Just Home Page) | Design: Choen | PageNav: Abu Farhan