TheTAZForumBlog

A Membership Committee Run place where you can relax and have some fun.

 
TheTAZZone.com
TheTAZZone.com website is the Information Arm of the TAZ Zones. .
TAZForum
TAZForum is a Community run by a Membership Committee of Administrators/Mods/ and regular members. A very relaxed atmosphere, feel free to lounge, relax, and enjoy yourself.
TheTAZZone.net
A full links page, and the latest posts.
The Security Zone
The newest installation to TheTAZZone is a no-nonsense forum for security enthusiasts and professionals.
TheTAZZone.org
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
The Sports Emporium
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus.
The Earthquake Disaster in Haiti
Wednesday, January 20, 2010

All our best going out to the victims of the Haitian Disaster especially to the children and those who lost children

A few facts before we get to the tragedy, that is being well covered by others already…and just so we’re all on the same page…Haiti is in the Caribbean, and comprises the western one-third of the island of Hispaniola, between the Caribbean Sea and the North Atlantic Ocean, due west of the Dominican Republic, which comprises the rest of the island.

The Earthquake Disaster in Haiti

posted by Security News Media @ 5:33 AM   0 comments
Google revamps Summer of Code for 2007
Friday, February 23, 2007
Google's Summer of Code (SOC) will be back again this year, and this time, Google plans to take advantage of lessons learned to improve the program for everyone involved.

Now in its third year, SOC is a program that pays students to code for free and open source software (FOSS) projects. Since the program started in 2005, more than 1,000 students have participated in more than 100 projects, and perhaps 10 times that many have applied to participate. About 80% of participants completed their projects in the previous two years, earning themselves $4,500 and the projects that mentor them $500.

Read more...

posted by devpon @ 7:47 PM   0 comments
Hardware Versus Software Firewalls
Sunday, February 18, 2007
According to estimates, an unprotected Windows computer system connected to the Internet could be compromised within twelve minutes. In light of this, the need for computer security has expanded in the last few years. Today, it is just as necessary for home users to secure personal computers as it is for businesses to secure office computers. In order to gain security benefits like those many businesses possess, home network security often utilizes the same models. The difference, however, has been that most home users do not have the financial resources for top of the line security equipment. This has led many home users to begin using security tools such as freeware firewalls and over-the-counter hardware firewall solutions.
Read more...
posted by devpon @ 4:10 PM   0 comments
Security pros work to undo teacher's conviction
Saturday, February 10, 2007
Researchers led by the head of a Florida anti-spyware firm aim to recreate what caused a Connecticut school's classroom computer to start displaying pornographic pop-ups in October 2004, an incident that recently led to four felony convictions for the substitute teacher involved.
On January 5, a six-person jury found former Kelly Middle School substitute teacher Julie Amero guilty of four counts of risk of injury to a minor. The charges stem from an October 19, 2004 incident when the computer in the classroom in which Amero was teaching started displaying pornographic pop-up advertisements. Prosecutors argued that Amero surfed porn sites while in class, causing the pop-up advertisements, while the former teacher's defense attorney argued that spyware installed from a hairstyling Web site caused the deluge of digital smut.
more....
posted by devpon @ 11:36 AM   0 comments
Just the beginning
Thursday, February 08, 2007
Well, this is my first attempt at blogging. To post content on a regular basis will be a challenge. Not just articles by others, but my own ramblings, which I hope will be a regular part of this blog. As more content is added here, your suggestions or criticism are appreciated. I will be adding both serious and humurous content to keep this blog interesting.
Feel free to stop by the forums. We welcome all, from the beginner to the advanced.

TAZ Forum
The Security Zone
posted by devpon @ 5:17 PM   0 comments
American Pie' actress of threatening sex abuse of dog
Sunday, December 17, 2006
Charges dropped against 'American Pie' actress of threatening sex abuse of dog

NEW YORK (AP) - "American Pie" star Natasha Lyonne, arrested after threatening to sexually abuse a neighbour's dog, left court a free woman Friday after a judge promised to dismiss the charges against her.

Manhattan Criminal Court Judge Anthony Ferrara said because Lyonne successfully completed a court-ordered drug program and paid US$2,000 restitution, he was sentencing her to a conditional discharge.

Assistant district attorney Remy Taborga confirmed Lyonne had met the conditions set by the court. The prosecutor recommended the conditional discharge, which means if Lyonne is not arrested within the next six months, the charges will be dismissed.


TAZ Forum :: A Computer, Gaming, and Social Network Community of Friends :: View topic - American Pie' actress of threatening sex abuse of dog
posted by Security News Media @ 6:01 AM   0 comments
identifying the assets and their values
Monday, December 04, 2006
Hi

Apart from identifying the assets and their values,
the starting point for such a risk assessment is
what we call the threat agent: hurricanes, floods, fire,
virus, intruder, ..., (spammer, employee, ...)

Then, vulnerabilities for each threat agent are defined,
like thatched roof, lack of antivirus software, lack of entry-control, ...

As a result, you may define threats, like uncontrollable fire,
virus infection, stolen devices or 'secrets', ...


Then you continue with probabilities, impacts, countermeasures, ...
as you know it.


One source of confusion I have seen is the "difference"
between threat agents and threats. Often, these are
used as synonyms, which leads to confusion. At least from a
computer security perspective, a threat agents exploits a
vulnerability to realise a threat.

Good luck Smile

Cheers


by sec_ware

TAZ Forum :: A Computer, Gaming, and Social Network Community of Friends :: View topic - identifying the assets and their values
posted by Security News Media @ 3:15 PM   0 comments
About Me

Name: Security News Media
Home:
About Me:
See my complete profile
Previous Post
Archives
Links
Powered by

Free Blogger Templates

BLOGGER

© 2005 TheTAZForumBlog Template by Isnaini Dot Com