Home » Archive

Articles in the Data Management Category

Data Management | Posted 17 Jan 2012 | Comments Off on IT Zanshin | 1,890 views
Secure Data

This article is part one of a three part series on applying the martial arts concept of zanshin to the information technology sector.

In the martial arts world, there is a concept called zanshin. It’s defined as a state …

Data Management | Posted 21 Jan 2011 | Comments Off on The Math Behind A DOS Attack | 1,626 views

The scenario is quite common. A web server that has been running well suddenly starts acting sluggish, and then suddenly it falls over. The site is down. System administrators are investigating, and managers are wondering if the site is being …

Data Management | Posted 3 Mar 2010 | Comments Off on Password Management Strategies | 1,548 views
Secure Data

The best password management strategies start with good policy. Everyone who uses a password to gain access to restricted resources needs to understand the responsibility and stewardship that they inherit when they keep passwords. Be sure that password policies are …

Data Management | Posted 21 Feb 2010 | Comments Off on Adobe Pushing Third Party Software? | 1,243 views

Security researcher Aviv Raff has revealed that the Adobe Download Manager can be tricked into installing third party software. Adobe has responded, and stated that they are working with Raff to resolve the issue. Unexpected Adobe updates should …

Data Management | Posted 26 Nov 2009 | Comments Off on Tis The Season | 1,373 views

It’s official. The Macy’s Thansgiving Day Parade is over, and the Christmas season is here. Black Friday deals are published, and everyone is looking for a bargain. There will be plenty of amazing offers, and retailers will have plenty of …

Data Management | Posted 24 Oct 2009 | Comments Off on BleachBit | 1,254 views
BleachBit is an open source fast privacy and cleanup tool that is very easy to use. The application provides cleaners for over 50 common applications. This includes all the common browsers such as Internet Explorer and Firefox as well as many other desktop application like Microsoft Office.
Data Management | Posted 20 Dec 2005 | Comments Off on TrueCrypt Virtual Disk Encryption | 1,502 views

TrueCrypt creates virtual encrypted disks on Microsoft Windows and Linux. It is based on a project called Encryption for the Massess (E4M). TrueCrypt provides “on-the-fly” encryption to automatically encrypt files as they are save to the virtual volume. …