Last Articles


Most popular password

Network Information Security: Myths and Realities Omnipotence hackers

Hackers and crackers, or what is good and what is bad?

Chronology of the ARPANET - INTERNET

Protection system in Windows - Fact or Fiction

The basic principles of security

Manager SAM and Active Directory

Administrative boundaries: the forest or domain?

Can you trust a domain that is connected to the Internet?

Идентификаторы защиты (SID)

Why can not I log in as an administrator from any location?

Network security model and resource sharing

Remote attacks on distributed computing systems

Characteristics and mechanisms of implementation of standard remote attacks

Fake ARP-server on the Internet

False DNS-server on the Internet

Substitution of one of the subjects TCP-connections on the Internet

Malfunction host on the network

Mythical remote attacks on the Internet

Dedicated channel communication between objects distributed CS

How to choose best-in password generator

 The network was established many programs and sites to generate passwords. How can choose best-in password generator?

 Recommend to send a care in the following details:

  •  Passwords by all means should be generated on your computer. Otherwise no one can guarantee you that the password has not been recorded in the database and will not be used to access your it. Of course, the possibility that the site administrator - password generator will be able to find just the person who received the password is small, but it is present;
  •  The site should load quickly. This, of course, optional circumstance, but the password is usually required in the here and now "and expect more than that a few seconds, while the download sites or scripts will work out, think, you do not want;
  •  It is advisable that the site gave some categories of passwords: starting with the most common used for "single sign-on" to complex passwords with wildcard and different registers, which will be helpful to protect particularly sensitive information.
Top 5 most read

The basic rules of safe behavior on the Internet

Manager SAM and Active Directory

You forget your password. What should I do? Part 3

Идентификаторы защиты (SID)

Social engineering as a way of committing crimes in the sphere of computer information

Copyright © 2010 BRV ISTCOM S.R.L.- раскрутка сайта