Configure-Windows-Firewall-Rule-using-Group-Policy-4.png

Configure Windows Firewall Rule using Group Policy

Every Windows OS comes with a native firewall as the basic protection against malicious programs. Windows Firewall controls the incoming and outgoing traffic from and to the local system based on the criteria defined in the rules. The criteria can be program name, protocol, port, or IP address. In a domain environment, administrator can centrally […]

cyber-crime-300x199.jpg

Computer Crime

Computers and information systems have become the indispensible part of the business. There is no surprise that these computer systems have become the target of criminals. Computer crime can have significant impact on businesses and institutions. The crimes have been divided into two categories. Image Credit: Odosta.com Computer Crime Computer as tool Criminals use computer […]

Types of Router Attacks

Router is a device that operates in layer 3 of OSI model which main function is path selection and packet forwarding. Routers can be core network equipment in any organization so the security of router is major concern. However there are different types of router attacks that network professionals must be aware of. Types of […]

ethical-hacking-256x300.jpg

Ethical Hacking

Ethical hacking is the methodology that the organization uses to find weakness in their network or system. An organization usually employs or contracts the hacker to perform the ethical hacking activity. Foot printing, scanning and enumeration are the very first steps that the hacker goes through. Credit: USR-LIB Foot Printing This is the first step […]