Search results forevents

Operating Systems Security: Protection Measures Analysis

O

The Internet has brought us a wealth of conveniences and everyday tools that we could not live without and more importantly a dependency that we cannot break. In the workplace the Internet has become a part of our day to day lives. We rely on instant communication with our co-workers, friends and colleagues as well as access to a multitude of information at our fingertips. Children from younger...

Robots.txt for WordPress : Useful tips and settings for better SEO

R

Google bot and other search spiders will visit the robots.txt file of your website immediately after they hit the htaccess file. Both these files are crucial as they can affect your site’s organic presence. Htaccess has rules to block IP addresses, redirect URLs, enable gzip compression, etc. The robots.txt will have a set of rules for the search engines. It has few lines that will either...

Honeypots: To Lure or Not To Lure

H

This is post 2 of 8 in the series “Prevention and Protection Strategies” Intrusion Detection Honeypots: To Lure or Not To Lure Managing Access to Information Resources More on Limiting Damage to Information Assets Post Authentication Methods Usable Security? User Friendly Factors SQL Injection Explained Web Application Database Vulnerabilities to be Aware of Honeypots are sometimes...

Rockville Drupal Meetup

R

Are you a Drupal developer or someone who is interested in learning or hearing more about the platform?  Each month there are various ‘meet-ups’ that take place across the area.  ICF International now co-sponsors two of these meet-ups, one is held in our Fairfax office and the other in Rockville.  Last night we held our first Rockville meet-up, which was a big success. 

Financial Sector Cybersecurity Regulations

F

(Bidgoli, 2006) describes the statutory approach in the United States as being sectorial in nature “because the laws are drawn along industry lines.” This contrasts other parts of the world, such as the European Union, which has a non-sectorial approach where, for example a comprehensive privacy law applies to all organizations regardless of their industry.

Hacktivism, Anonymous, and the Bureau of Justice Statistics

H

In recent years news stories have highlighted the increasing rate of cybercriminal activity targeting both private organizations and government entities. Cases from mischievous amateur hackers managing to exploit basic vulnerabilities, to more advanced security breaches carried out by expert criminal hackers and cybercrime organizations overseas, have grabbed the attention of the media.

Cybercrime: Law Enforcement and E-Government Transnational Issues

C

During his 2013 State of the Union address, President Obama highlighted the importance of defending our nation from the many cyber threats that are continuing to dominate the news cycles. Just days prior to the President’s speech, eighteen people were charged in a massive credit card fraud ring. The Associated Press (2013) described it as a “sprawling international scam that duped credit-rating...

Cybersecurity as a Public Good

C

Over the last decade, the boom of the Internet has had a major impact on the way we interact with other individuals and business entities.  Products and services have become available at the touch of a button and access to vast amounts of information has become available to anyone with a direct connection to the web.  Much correspondence, which was traditionally mailed through the...

Evaluation of a Major News Website From a Human Cognitive Perspective

E

Over the last decade, a shift has occurred in the way many people access, read and watch current events and news.  From the traditional newspapers and scheduled television news programs, we have moved to a more dynamic interactive medium, which dispenses information in a real-time format.  News websites are a fairly young media; however they have evolved exponentially since the late 1990s to the...

Security of Information Systems Infrastructure of an International Airport

S

This is post 7 of 7 in the series “Cyberspace and Cybersecurity” Government Cybersecurity Initiative for a Universal Internet ID Malicious Code Intrusion Password Cracking – An Exercise Using Cain and Abel to Crack User Passwords What exactly is Cyberspace and Cybersecurity? Security Concerns with Outsourcing IT Services Baseline Security Analyzer – Testing a Standard...

Getting Inside Creativity Den: New Inspiration Blog for Designers

G

Web designers have no shortage of inspiration these days. It seems as though there are new design and inspiration blogs popping up every hour, and there’s never a shortage of posts to go around. With new social media sites such as Design Moo and DesignBump, articles for graphic artists and web designers are able to spread like wildfire. It’s rare when you run across a unique and...

Manage Your Businesses Internet Marketing with twtapps

M

Twitter has skyrocketed into mainstream with seemingly no meaning behind it. The simple application allowing everyone in the world to share what they’re doing, thinking, or feeling in 140 characters has grown into one of the most popular web 2.0 applications on the web, and it’s no doubt there are many apps on the web to accompany it. Although not affiliate with Twitter in any way...

MySims Party

M

As you may know MySims is a simulation game on Wii. But over the management of family, you can head a Sims and invests in a real mission, if not a destiny: to revive a virtually abandoned city. The next MySims almost deserves to be renamed OurSims. Indeed, MySims Party is a license that offers a real multiplayer aspiration and explores new ways to play video games. However, it forgets nothing...

Okami – Wii Review

O

While the pointer of my blog editor flashes before my eyes, I suddenly feel some anxiety, some fear. The latter told me that I could not find the right words to describe what I was invaded by discovering Okami. Thus, paradoxical as it may seem, the doubt comes knocking at my door just as many blank pages await my impressions I sleep to tell you my journey, the same one that made me assume the...

Boom Blox – Wii Review

B

We don’t have to introduce you Steven Spielberg, the great director who marked his entire generation of cult films such as Jaws, ET, Close Encounters of the Third Kind, Jurassik Park, Indiana Jones or The Saving Private Ryan. In the last 25 years, this genius of the cinema has become one of the greatest filmmakers of all time and has amassed a colossal fortune that he invested to produce new...

Why Do We Need Financial Regulation?

W

[1]  “The purpose of financial regulation is to improve upon the performance of financial markets relative to how they would perform driven solely by the forces of the private marketplace.” Banking is one of the most highly regulated industries within the United States.  We can understand the impact of regulation by taking a look at the history and evolution of the banking system through to the...

About Author

Ian Carnaghan

I am a software developer and online educator who likes to keep up with all the latest in technology. I also manage cloud infrastructure, continuous monitoring, DevOps processes, security, and continuous integration and deployment.

Follow Me