Video Screencast Help

Search

Search results

Hello, Complicated is the word that best describes the modern world of the IT manager. IT managers in small or medium sized businesses (SMBs) face a particularly challenging environment where the demands of the organization are high and resources are ...
Article by Mithun Sanghavi | 25 Apr 2013 | 6 comments
1 Introduction Smartphones have been widely adopted by organisations for day to day business and operational use, and employees can often access their work related data by connecting to corporate networks using their Smartphones. Many ...
Article by Vikas Rajole | 07 May 2013 | 12 comments
Hi today i am going to explain the thing that you have to know about SQL Injection. What is SQL injection  How it work   What is SQL injection: -SQL injection is attack vector in which attacker directly execute SQL query ...
Article by Vin32hack | 22 Mar 2013 | 0 comments
Here are some common Recommendations / Best Practices to be followed in an organisation for Security Incidents triggered by SIEM (SSIM) depending on the rules: 1) IP Spoofing: Check for any misconfiguration. Deny private addresses. ...
Article by SG Raj | 22 Mar 2012 | 1 comment
Lets know about clickjacking which is nowdays a big challenge for security experts and due to this unsecure website are attacked and frauds are done. Clickjacking attacks are conducted by transparently overlaying some benign web element with some ...
Article by kishorilal1986 | 16 Feb 2012 | 19 comments