TechnicalJones.com

Author

Leroy Jones, Jr. is the creator of Talking Technology with Leroy Jones, Jr.

Recently in Cybercrime Category

CYBER CZAR

| No Comments
PoliticsCyber_Dec 2008.jpg

The evolution of Technology and Politics continues:

Tech commission suggests new cybersecurity post




BlackRefer.com

Add to Technorati Favorites

Digg!


CYBER CZAR

| No Comments
PoliticsCyber_Dec 2008.jpg

The evolution of Technology and Politics continues:

Tech commission suggests new cybersecurity post




BlackRefer.com

Add to Technorati Favorites

Digg!


TECH TERMS - AUTHENTICATION

| No Comments
Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for TechTerm_Image 2008.png

What is Authentication?

Definition:  The process of determining whether the individual signing in under a specific user name actually has an account with permissions to perform specific actions.

Authentication can be as simple as providing a user name and password, but especially in high dollar e-commerce settings, authentication is usually done in conjunction with access across secure channels and sometimes alternative authentication mechanisms (from thumb prints to retinal scans).


TECH TERMS - AUTHENTICATION

| No Comments
Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for Thumbnail image for TechTerm_Image 2008.png

What is Authentication?

Definition:  The process of determining whether the individual signing in under a specific user name actually has an account with permissions to perform specific actions.

Authentication can be as simple as providing a user name and password, but especially in high dollar e-commerce settings, authentication is usually done in conjunction with access across secure channels and sometimes alternative authentication mechanisms (from thumb prints to retinal scans).


TECH TERMS - WORM

| No Comments
Thumbnail image for Thumbnail image for Thumbnail image for TechTerm_Image 2008.png

What is a Worm?

A program that replicates itself by installing copies of itself on other machines across a network, usually resulting in damage to existing files and data on the network.





BlackRefer.com

Add to Technorati Favorites

Digg!


TECH TERMS - WORM

| No Comments
Thumbnail image for Thumbnail image for Thumbnail image for TechTerm_Image 2008.png

What is a Worm?

A program that replicates itself by installing copies of itself on other machines across a network, usually resulting in damage to existing files and data on the network.





BlackRefer.com

Add to Technorati Favorites

Digg!


CYBERATTACK POLITICS

| No Comments
CyberCrime_Nov 2008.jpgThe historic election year has not slowed down cyber bad guys.

Both the Obama and McCain campaigns came under cyberattack.

We have now learned that the White House e-mail system also came under attack.

Technology continues to change the challenges we all face.



BlackRefer.com

Add to Technorati Favorites

Digg!


CYBERATTACK POLITICS

| No Comments
CyberCrime_Nov 2008.jpgThe historic election year has not slowed down cyber bad guys.

Both the Obama and McCain campaigns came under cyberattack.

We have now learned that the White House e-mail system also came under attack.

Technology continues to change the challenges we all face.



BlackRefer.com

Add to Technorati Favorites

Digg!


SECURITY ALERT - CELL PHONE ZOMBIES

| No Comments
Thumbnail image for CellPhoneSecurity_Oct 2008.jpg
I thought you would want to know.

Security Alert: Cell Phone Zombies

Hope it helps.




BlackRefer.com

Add to Technorati Favorites

Digg!




SECURITY ALERT - CELL PHONE ZOMBIES

| No Comments
Thumbnail image for CellPhoneSecurity_Oct 2008.jpg
I thought you would want to know.

Security Alert: Cell Phone Zombies

Hope it helps.




BlackRefer.com

Add to Technorati Favorites

Digg!




Main Index