Posts Tagged ‘Data security’

intrusion

ExifDataView Utility To Check Image EXIF Data

CCTV and video surveillance systems are installed on every modern organization this comes as a physical security measure to record any security restriction at any point of the company.  But on the other hand this can make organization open to some attack where outsiders can get more information about system in use. Malicious users are [...]

Share

DBAN Hard Drives Wiping Utility

Data and files stored on your hard disk may contain a very sensitive information , previous study conducted by Researchers from BT and the University of Glamorgan  demonstrated at which point reputable organization do not care about data security. Researchers started by purchasing 300 hard drives previously used from online store (eBay) and they recovered [...]

Share

OneSwarm a secure P2P file sharing utility

Peer 2 peer is a widely used protocol that help in sharing and connecting nodes on internet, I think any person in the past used all sharing programs such as Bittorrent , kazaa or napster which allows to exchange files , data and more. Peer 2 peer is good way to share files but it [...]

Share

Secret Disk Application to Hide Personal Data

Protecting information from unauthorized access or destruction is very important. from the technical point of view this is possible using special security settings and applications, there is a very interesting solution called Secretdisk that do not use any encryption but it provide a way for controling access to hard disk by hiding it. this application [...]

Share

FileLife Keep your File in Control

Data leakage is a problem that we face at any corporate environment, I remember a case at a Television where a team prepared an interview with a political person, this interview have been saved on the shared server and was planned to be displayed on next week. After this big work in montage and time [...]

Share

Online Document Management – Protecting Your Confidential Data

Some companies produce more documents than services or products. Business plans, contracts, RFPs and RFQs, financial data… it’s an endless list. Many are created and managed online via the corporate Intranet, but what happens when they need to be transferred or shared? Without an online document management system to protect the  confidential data, how can [...]

Share

Evading Disk Investigation and Forensics

Encrypting files and data is a good way to assure their confidentiality, but this will not prevent a third party person from detecting the encrypted storage.  Researcher at University of Southern California and Computer Sciences from NUST in Pakistan discovered an interesting way to secure data based on steganography techniques. Presented technique allow a person [...]

Share