Categories

A sample text widget

Etiam pulvinar consectetur dolor sed malesuada. Ut convallis euismod dolor nec pretium. Nunc ut tristique massa.

Nam sodales mi vitae dolor ullamcorper et vulputate enim accumsan. Morbi orci magna, tincidunt vitae molestie nec, molestie at mi. Nulla nulla lorem, suscipit in posuere in, interdum non magna.

AntiVirus Software Review Product Comparisons

\r\n

\r\n

\r\n

Why Buy Antivirus Software?

\r\nToday, an unprotected computer isn’t just vulnerable, it’s probably already infected. New viruses, spyware, trojans, worms, and other malware are created every day. New threats are disguised to bypass other security measures, and specifically designed to catch you and your PC off guard.\r\n\r\nThe virus landscape […]

Worm or Virus – What is the Difference?

\r\n\r\nEveryone has been infected with a virus at one time or another either through the common cold or the flu. A virus attacks the human body by entering through one of the many openings and attaching itself to a host cell. It releases a piece of genetic information into the cell and recruits the cell’s […]

Top Rogue Scanners to Avoid

Fake Antivirus scanners, or Rogue scanners come in many forms. Many alter the properties of your browser window to make it look like a legitimate program, when in reality, it’s just a browser window. Others, executed via active-x, script or injected via a Virus, will actually look like a running program. These programs have a […]

SQL Injection: How To Prevent Security Flaws In PHP / MySQL

\r\n

\r\n

\r\n

\r\n

\r\n

What is SQL Injection\r\nMost new web developers have heard of SQL injection attacks, but not very many know that it is fairly easy to prevent an attacker from gaining access to your data by filtering out the vulnerabilities using MySQL extensions found in PHP. An SQL injection attack occurs when […]

ASP.Net Vulnerability Patch released: Microsoft Security Bulletin MS10-070

ASP.net Vulnerability patch released […]

ASP.NET Security Vulnerability Workaround

In our first community post we covered a workaround you can apply immediately on your sites and applications to prevent attackers from exploiting it. Today, we are revising it to include an additional defensive measure.\r\nThis additional step can be done at a server-wide level, and should take less than 5 minutes to implement. Importantly, this step does not replace the other steps in the original workaround, rather it should be done in addition to the steps already in it. Below are instructions on how to enable it. […]

Hello world!

Welcome to SysAdmin community site. You’ll get help, news, discussions and collection of tools for System administration & IT Professionals. The target is to make this community to be one of biggest community of System Administrators and IT Professionals. […]