Category Archives: Computer Security

Bluetooth Security

Abstract Bluetooth is one of the most widely used technologies used by various devices such as mobile phones, gaming consoles, laptop and computer peripherals. This article discusses about Bluetooth security, technology standards, security features, vulnerabilities and risks associated with using … Continue reading

Posted in Computer Security | Comments Off on Bluetooth Security

How to configure server

This tutorial provides you with a step by step configuration for a simple Linux server on how to configure server. Linux Fedora core server is chosen for this tutorial, however configuration for other distributions may vary.¬†Fedora is free Linux distribution … Continue reading

Posted in Computer Security, Tutorials | Comments Off on How to configure server

Security policy development for SME

Abstract This article provides explanation for security policy development for small medium enterprises. Information security has three main goals which includes: Confidentiality, Integrity and availability. Donn parker has introduced an alternative to this model by adding three more principals including: … Continue reading

Posted in Computer Security, Information Technology | Comments Off on Security policy development for SME