GLOBAL INTERNET FILTERING

Evidence of filtering Suspected filtering No evidence of filtering Azerbaijan Belarus Afghanistan Bahrain Kazakhstan Algeria China Egypt Ethiopia Iraq India Israel Iran Kyrgyzstan Jordan Malaysia Libya Moldova Morocco Nepal Myanmar Russia[*] Oman Ukraine Pakistan Venezuela Saudi Arabia West Bank/Gaza Singapore […]

read more →

DATA MINING

As stated earlier, data mining is the process of posing various queries and extracting useful information, patterns, and trends, often previously unknown, from large quantities of data, possibly stored in databases. Essentially, for many organizations, the goals of data mining […]

read more →

TROJAN PORTS

TCP 1 Breach.2001, SocketsDeTroie.230, SocketsDeTroie.250 TCP 28 Amanda.200 TCP 31 MastersParadise.920 TCP 68 Subseven.100 TCP 142 NetTaxi.180 TCP 146 Infector.141, Intruder.100, Intruder.100 TCP 171 ATrojan.200 TCP 285 WCTrojan.100 TCP 286 WCTrojan.100 TCP 334 Backage.310 TCP 370 NeuroticKat.120, NeuroticKat.130 TCP 413 […]

read more →

COMPUTER CRIME

One need not be a law-enforcement officer or a computer-security expert to realize that computer crime is on the rise. These crimes range from computer-network administrators hacking into the computers of current and/or former employees to major credit-card theft and […]

read more →

WEAK PASSWORD CRITERIA

It’s best to assume that a password that meets any of the following criteria is weak: It appears in the English dictionary It is the name of a well-known city anywhere in the world It is the name of any […]

read more →