Techie Talks
-
Security+
Complying with Privacy and Security Regulations
Complying with Privacy and Security Regulations: An organization’s security management policies don’t exist in a vacuum. Regulatory and governmental agencies…
Read More » -
Security+
Typo Squatting and URL Hijacking
Typo Squatting and URL Hijacking: Typo squatting (also spelled typosquatting) and URL hijacking are the one and the same. Difficult…
Read More » -
Security+
Government and Military Classification
Government and Military Classification: The U.S government and the military have slightly different types of concerns relating to information classification.…
Read More » -
Virus
Surviving Viruses
Surviving Viruses: A virus is a piece of software designed to infect a computer system. Under the best of circumstances,…
Read More » -
Virus
Antivirus Software
Antivirus Software: The primary method of preventing the propagation of malicious code involves the use of antivirus software. Antivirus software…
Read More » -
Virus
Symptoms of a Virus Infection
Symptoms of a Virus Infection: Many viruses will announce that you are infected as soon as they gain access to…
Read More » -
Web Hacking
Understanding Certificate Revocation
Understanding Certificate Revocation: Certificate revocation is the process of revoking a certificate before it expires. A certificate may need to…
Read More » -
Web Hacking
Certificate Policies
Certificate Policies: Certificate policies define what certificates do. A CA can potentially issue a number of different types of certificate—say,…
Read More »