Articles In Uncategorized

By Gotham, Posted in Uncategorized

From the Microsoft Windows Server 2008 Glossary: A brute force attack is an attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered. ... read more.

  • January 16, 2013

By Gotham, Posted in Uncategorized

From the Microsoft Windows Server 2008 Glossary: A brute force attack is an attack by a malicious user or malicious software on a computer or operating system to find a secret password or a symmetric encryption key by guessing passwords or keys until the correct password or key is discovered. ... read more.

  • January 16, 2013

By Kellye Garrett, Posted in Uncategorized

Every month Gotham holds Gotham Jeans Day, an internal fundraiser for charities selected from employee suggestions. Past recipients have included the United Way and the Black Dirt Toy Drive. Our January charity was the Ulster Literacy Association. Ulster Literacy Association (ULA) provides New York residents with the tools they need to read, write, and speak the English language. ULA has provided literacy tutoring for adults since 1981. Tutoring is provided on a one-to-one or small group setting.  All tu... read more.

  • January 15, 2013

By Gotham, Posted in Uncategorized

From the Check Point Glossary of Terms: IP spoofing is a technique where an attacker attempts to gain unauthorized access through a false source address to make it appear as though communications have originated in a part of the network with higher access privileges. For example, a packet originating on the Internet may be masquerading as a local packet with the source IP address of an internal host. The firewall can protect against IP spoofing attacks by limiting network access based on the gateway interfa... read more.

  • January 09, 2013

By Gotham, Posted in Uncategorized

From the Check Point Glossary of Terms: IP spoofing is a technique where an attacker attempts to gain unauthorized access through a false source address to make it appear as though communications have originated in a part of the network with higher access privileges. For example, a packet originating on the Internet may be masquerading as a local packet with the source IP address of an internal host. The firewall can protect against IP spoofing attacks by limiting network access based on the gateway interfa... read more.

  • January 09, 2013

By Kellye Garrett, Posted in Uncategorized

Here are some of the technology stories that caught our eye this week: Microsoft issued a quick fix for a zero-day vulnerability that could allow remote code execution in older versions of Internet Explorer. Symantec credited the hacker group Elderwood with discovering the vulnerability. In other Microsoft news, InfoWorld shared what we could expect from the tech company this year. PC World explained why Windows 8 makes sense for business. One reason was faster boot times, with Windows 8 starting i... read more.

  • January 04, 2013

By Gotham, Posted in Uncategorized

From TechTarget: Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. ... read more.

  • January 02, 2013

By Gotham, Posted in Uncategorized

From TechTarget: Social engineering is a term that describes a non-technical kind of intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures. ... read more.

  • January 02, 2013

By Gotham, Posted in Uncategorized

From TechTarget: Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission. ... read more.

  • December 27, 2012

By Gotham, Posted in Uncategorized

From TechTarget: Malware (for "malicious software") is any program or file that is harmful to a computer user. Thus, malware includes computer viruses, worms, Trojan horses, and also spyware, programming that gathers information about a computer user without permission. ... read more.

  • December 27, 2012