Information about vulnerabilities that may effect your computing

Types of Wireless Attacks

June 13, 2010 admin 0

Standard wireless communication occurs when the end user and the wireless access point are able to communication on a point-to-point basis without interruptions. There are many attack variations in existence against wireless networks that breaks the standard communication format. These attacks includes the denial of service attacks, the man in the middle attacks and the WEP key-cracking attack to name a few and are described below. […]

Computer Malware and Preventive Recommendations: Botnets

June 13, 2010 admin 0

Botnets are one of the fastest growing and the most dangerous threat on the Internet today. “Bot” stands for robot, which is a piece of software with some intelligence to perform a task and the “net” stands for network which is the collection of these individual bots under one controlling person called a bot herder. […]

1 9 10 11