Pages

Saturday, December 17, 2016

Who doesn't like to b a creator of something new..
Who doesn't want play God and feel devine
Well here is chance to play your own role as God while working on your computer.
Check out the God mode in MS Windows.  This feature has been available with all versions of MS Windows 7 onwards.. We will how it's done in Windows 10.. Follow the link given below
https://fossbytes.com/how-to-enable-godmode-windows/

Saturday, November 12, 2016

There have been frustrating times for coder and students and general Linux users while taking down notes ot just jotting  down their thought that they wish they had something simpler yet powerful notepad like tool.. Well there are a list of apps which augment features of notepad and features like Evernote..
Check these out
http://www.makeuseof.com/tag/top-notepad-apps-linux-can-sync/

Saturday, November 5, 2016

The emphasis on ensuring safety of your digital assets,  data included cannot go overboard ever.  This is one such field that would always remain Achilles heal for management and sore point of discussion in boardroom meetings whenever financial allocations are being carried out.. Check this out.. A primer

http://www.bizlibrary.com/article/cybersecurity-training-team-sport/

Saturday, October 29, 2016

  *Though a dated,  old article but give lots of basic information about different image formats that comes with tips on what format to be used and when..
This is a detailed summary of all popular image formats with comparisons also..  Handy reference
 Happy hunting

Ref http://blog.hubspot.com/insiders/different-types-of-image-files


(All copyrights of respective owners) 

Wednesday, August 10, 2016

Is Human factor weakest link in security?

Human factor: Weakest Link!
  • It has been always been a strong point of debate  whenever it is discussed for implementation of Cyber Security..  Who is the Weakest Link? Identification has never been difficult for Security team and they  have be univocally supported by both, Executives and /management…THE USER.
  • The User.. is known by many other names
    • Client
    • End user
    • field agents
    • office staff
    • non developers
  • Since ages the human link is taken as “Weakest Link” in security be it Physical or now “Cyber”.
  • However This fact has been overlooked more often that not that very same “HUMAN” factor is major contributor in implementing the ROBUST SECUTIY ARCHITECTURE.
  • Awareness : What Lets one down is the “Lack Of Awareness Training”..The basics are forgotten..what is the main factor to plug this?.. Create Awareness… How? Training is the best way of creating awareness.
    • It can be integral part of appraisals process.
    • Divide into various levels of training
      • Beginners ..for freshers and new recruits
      • Middle level…for those having completed some time in the company and those who are due for appraisal
      • Advanced and Refresher courses… At the time of change of any major policy or revision as well as on introduction of new equipment
  • Thus we can say its always the Onus on the Security Professionals as well as the Management
  • A detailed study carried out by eforensics magazine highlights such issues https://eforensicsmag.com/human_factor/

Proud Blogger

Powered By Blogger