11 Most common computer security threats

THREAT #1: VIRUS Description: A virus is a piece of software that can replicate itself and infect a computer without the permission or knowledge of the user. A virus can only spread when it is transmitted by a user over a network or the Internet, or through removable media such as CDs or memory sticks….

Adobe Flash Player and AIR Domain Sandbox Bypass Vulnerability (APSB10-06)

Two (2) potential risks associated with this vulnerability are Denial of Service issue (CVE-2010-0187) Allowing users to make unauthorized cross-domain requests We recommend verifying the version number of the present adobe flash player and then reviewing the solution in order to resolve this issue. See below on how to verify the version number and reviewing the…

Adobe Acrobat and Reader Multiple Vulnerabilities (APSB16-14)

Users on Windows and Macintosh systems can utilize the Adobe product’s update mechanism. The default configuration is set to run automatic update checks on a regular schedule. Adobe recommends users update their software installations to the latest versions by following the instructions below. The latest product versions are available to end users via one of…

Administrator Account’s Password Does Not Expire

While there are queries that can be run in Active Directory Administrative Center to determine which accounts haven’t had their passwords changed recently, this is not a task that’s likely to be performed by anyone outside the administration team. Ultimately whether your select the “password never expires” option is up to you. Enabling it does…

What’s Microsoft?

Microsoft is the world’s leading producer of computer software. Microsoft was incorporated in 1981, but the company’s roots go back at least as far as 1975, when the first commercially available personal computer appeared on the cover of Popular Electronics. The Altair 8800, as it was called, was a rudimentary system, but it found a…

7-Zip gets an update to fix major security vulnerabilities

Security researchers from Talos have written a bunch of fancy words on their blog here, which basically say 7-Zip has a couple of serious security flaws. Everyone’s up in arms about it, too. There are two major security flaws found in the program, one which allows hackers to remotely execute code (basically run programs from…

Features of Exchange Server Hosting

Security and reliability Exchange Online helps protect your information with advanced capabilities. Anti-malware and anti-spam filtering protect mailboxes. Data loss prevention capabilities prevent users from mistakenly sending sensitive information to unauthorized people. Globally redundant servers, premier disaster recovery capabilities, and a team of security experts monitoring Exchange Online around the clock safeguard your data. And…

What is a server?

A server is a computer designed to process requests and deliver data to other (client) computers over a local network or the internet. Although any computer running special software can function as a server, the most typical use of the word references the very large, high-powered machines that function as the pumps pushing and pulling data across…

What is an application software?

What is computer application software, and how does it differ from other categories of software? This lesson introduces you to some examples of application software and how they are used. Software Types The term ‘software‘ refers to the set of electronic program instructions or data a computer processor reads in order to perform a task…

10 benefits of virtualization in the data center

Data center virtualization can reduce your costs on facilities, power, cooling, and hardware, simplify administration and maintenance, and give you a greener IT profile. If you’re thinking about migrating to a hosted data center or looking for ways to improve your on-premise data center, I have one word for you: virtualization. Offering profound changes to…

Facebook
Facebook
Google+
Google+
http://supporttips.com/tag/software">
Pinterest
Pinterest
Instagram