Securitywing - securitywing.com - securitywing

Latest News:

How to Control Directory Access with Htaccess and Htpasswd in Apache 18 Aug 2013 | 06:28 pm

  Htaccess file is used to control access to directories in the web server. Normally, website administrators write htaccess file to put appropriate access control to files and pages stored in a specif...

8 Effective Ways to Improve IIS 7.5 Performance 4 Aug 2013 | 05:07 am

Like any other web servers, IIS 7.5 is capable of running web applications and sites blazing fast when you fine-tune some of its important performance parameters. This post will give you a list of eff...

Active vs Passive FTP Mode: Which One is More Secure? 28 Jul 2013 | 04:48 am

FTP or file transfer protocol is used to transfer files between two computers: one is FTP host or server and another is FTP client. In addition to transferring files, FTP helps to gain access to the p...

How to Build Failover Cluster in Windows Server 2008 19 Jun 2013 | 01:49 am

The main objective of a failover cluster is to ensure high availability of your services. A failover cluster means that only one server–which is also known as active server–in the cluster will provide...

How to Pass CISA at the First Attempt? 30 May 2013 | 03:29 am

Unlike most other vendor certification exams., CISA (certified information system auditor) is a paper-based test. Though,  ISACA never publish any data about the passing rate of this exam., it is pret...

Must Read Articles 4 Apr 2013 | 06:54 am

Linux Security Settings                            MySQL Security Settings Database Security Issues                        Oracle Security Basics Oracle Audit Setting Commands        WordPress Securit...

Yahoo Mail Security Settings:How to Protect Your Account 31 Mar 2013 | 09:27 pm

To secure your Yahoo mail account you need to block the doors that are easy for anyone to get access to your account. This post will help you to modify your account settings to make your mailbox  safe...

How Do I Know If My Computer Has Been Hacked? 29 Jan 2013 | 04:14 am

If you know some simple and easy-to-use methods to check that if your computer has been hacked you can confidently work online or visit any site  without much worrying about your data privacy. The goo...

What is 128 Bit Encryption?Why the Length is Important? 27 Jan 2013 | 09:37 pm

The purpose of any cryptography is to ensure the confidentiality, authenticity, non-repudiation and integrity of the data. And all these goals are achieved with the use of cryptography keys. The 128 b...

What is VPN and How it Works? 19 Jan 2013 | 06:10 am

By reading this post you can learn about VPN and its workings. VPN is just a term we use to describe a system which makes communication between two computers, regardless of how far they are, within a ...

Recently parsed news:

Recent searches: