Configuring Anonymous FTP Authentication (IIS 6.0)

You can configure your FTP server to allow anonymous access to FTP resources. If you select Anonymous FTP authentication for a resource, all requests for that resource are accepted without prompting the user for a user name or password. This is possible because IIS automatically creates a Windows user account called IUSR_computername, where computername is […]

Read More

7-Zip gets an update to fix major security vulnerabilities

Security researchers from Talos have written a bunch of fancy words on their blog here, which basically say 7-Zip has a couple of serious security flaws. Everyone’s up in arms about it, too. There are two major security flaws found in the program, one which allows hackers to remotely execute code (basically run programs from […]

Read More

What is a vulnerability?

Dictonary.com has several meaning for the word vulnerable, but when it comes to the computer world a the meaning of a vulnerability is no different.  To define a vulnerability simply means a computer network or application is open to attack. There is an existing weakness whether it is in the computer its self of procedures […]

Read More

What is a vulnerability assessment?

Vulnerability assessment  is a process that defines, identifies, and classifies the security gaps (vulnerabilities) in a computer software, network or infrastructure. An alternate term for vulnerability assessment is vulnerability analysis and this is an commonly used to determine counter measures for plugging these loopholes for product improvement or fight against external intrusion. Vulnerability assessments can be outlined using […]

Read More

What is a dedicated hosting server?

A dedicated hosting service, dedicated server, or managed hosting service is a type of Internet hosting in which the client leases an entire server not shared with anyone else. This is more flexible than shared hosting, as organizations have full control over the server(s), including choice of operating system, hardware, etc. There is also another […]

Read More

Features of Exchange Server Hosting

Security and reliability Exchange Online helps protect your information with advanced capabilities. Anti-malware and anti-spam filtering protect mailboxes. Data loss prevention capabilities prevent users from mistakenly sending sensitive information to unauthorized people. Globally redundant servers, premier disaster recovery capabilities, and a team of security experts monitoring Exchange Online around the clock safeguard your data. And […]

Read More

What is a server?

A server is a computer designed to process requests and deliver data to other (client) computers over a local network or the internet. Although any computer running special software can function as a server, the most typical use of the word references the very large, high-powered machines that function as the pumps pushing and pulling data across […]

Read More

What is an application software?

What is computer application software, and how does it differ from other categories of software? This lesson introduces you to some examples of application software and how they are used. Software Types The term ‘software‘ refers to the set of electronic program instructions or data a computer processor reads in order to perform a task […]

Read More

What is a computer network?

One of the earliest examples of a computer network was a network of communicating computers that functioned as part of the U.S. military’s Semi-Automatic Ground Environment (SAGE) radar system. In 1969, the University of California at Los Angeles, the Stanford Research Institute, the University of California at Santa Barbara and the University of Utah were […]

Read More

What is a wireless network?

What is a wireless network? How is it different from a wired network? And what are the business benefits of a wireless network? The following overview answers basic questions such as What is a wireless network?, so you can decide if one is right for your business. What Is a Wireless Network? What is a […]

Read More