Assuming security is required, the following results were found.

  • A Taxonomy of Loss

    The widespread commercial use of the internet has led to an increasing focus on systems security. Media driven hype and a lack of independent information can make the true level of threat to an organization difficult to determine. Adopting a structured...

  • Network Security

    use policies (eg. browsing inappropriate sites) A poorly configured or weak firewall can provide a false sense of security. The firewall itself can be vulnerable to attack. There are several steps which can verify and enhance the security of a network...

  • Bad security is worse than no security

    Poor security can lend a false sense of security, encouraging you to relax your guard and making it more likely that you will suffer loss or damage from bad guys. Analogy Consider a garage. If you have no lock on the door (no security), you are likely...

  • Open Source

    [ www.mysql.com ]. Mozilla Browser, Email, Newsreader that runs on Linux and Windows and doesn't have nearly as many security holes as certain other browsers and email clients that we could mention [ www.mozilla.org ]. The GIMP The GNU Image...

  • Making the move to Joomla

    you get for free (meaning no extra effort). Dynamic menus. Menu items appear in the right places at the right times. Basic security. I don't expect bullet-proof security from any web application, but most CMS's have some level of access control -...

  • My cat is cloud-based

    it, but think about the whole process/data life-cycle and consider the losers as well as the winners. Where is my data? Security is (or should be) a major concern for any outsourced data storage option [3]. Particular industries and jurisdictions may...

  • Reporting Bugs

    feedback will have more impact than you expect. A configuration problem Especially for bugs of the "I can't edit..." kind. Security settings and policies can change in the background without your knowledge and cause symptoms like this. A problem...

  • Planning for an Asterisk PABX installation

    of steps you can take to ensure that your PABX is available when needed but not easily exploited by hostileforces. System Security Asterisk runs on the Linux operating system. You should apply normal hardening practices to your Asterisk server (such as...

  • Privacy at Dropbear Consulting

    Consulting . If you do not wish to be contacted in this way, please tell us. We will respect your wishes. Information security Dropbear Consulting will not pass on personal information about youto any other party without your knowledge and consent...

  • Comments as spam

    Comments on web pages can be an interesting and valuable channel for communication with your customers, but they can also be a source of polluting spam. Recently I've been getting quite a few almost real looking comments that are actually bait for...

  • Adventures in synchronisation volume 3 - Files and Stuff

    need to transfer a file and not have easy access to a USB drive. Uploading the file to ownCloud does the job without the security concern of a public service like Dropbox and similar services. Redundant availability. Tragically, sometimes computers die;...

  • Adventures in synchronisation volume 1 - Address book

    web hosts . On my new host, ownCloud is supported by the automated application installer and it "just works". For extra security I've configured ownCloud to require SSL connection, so no login details of contact data is transmitted in clear text....

  • Moving out - changing web hosts

    hosting to a different provider and found the migration surprisingly smooth. That doesn't mean you can ignore basic data security practices, but it's nice to know things can go well. Why move? The service and reliability of my previous hosting company...

  • 3D content for web pages

    and IE had no support (unless you install the Chrome Frame [5] plugin). Like any new technology there are potential security concerns, so the usual caveats apply (so don't blame me if it all goes horribly wrong...) Samples Zygote body (...

  • Configurable or Customisable - which is better?

    rare to get this level of control in the commercial world, but you should expect to configure things like custom fields, security levels and report layouts without having to resort to code customisations. References Joomla extensions directory Joomla...

  • Backup or move your Joomla site

    a completely new one. If you don't know that you can restore your site your backups are only giving a false sense of security. Other uses - Site Development and Staging Because you can restore an Akeeba backup to a different server, you can use the this...


Results 1 - 18 of 18