Dear readers;
Cause of my intensive business, I stop blogging without telling anyone. I love the blog... Now, I want you to know I come back to blog. I might not updating this blog regularly but I'm always putting new shares in this blog almost every month.
Thank you all, my dear friends, for the wonderful comments! Thank you for your concern, care, and attention...
Enjoy my blog and don’t forget to comment after you read. ;)
Better at Security
A blog covering computer and internet security: including information about security terms, offering the latest security trends and up-to-date news about worms, viruses, trojans, adware and other internet threats. Plus security tips and recommendations to help you secure and protect your system from harm.
Tuesday, May 15, 2012
Wednesday, March 21, 2012
What is disk defragmentation? - Security Term
Disk defragmentation describes the process of consolidating fragmented files on your computer's hard disk.
Labels:
defragmentation,
Security Term
Tuesday, March 20, 2012
What is fragmentation? - Security Term
(1) Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and modifying files. At some point, the operating system needs to store parts of a file in noncontiguous clusters. This is entirely invisible to users, but it can slow down the speed at which data is accessed because the disk drive must search through different parts of the disk to put together a single file.
Labels:
fragmentation,
Security Term
Sunday, March 18, 2012
RoboForm Everywhere 6 Month License
Manage and Sync Passwords Across All Devices
How many logins is your brain struggling to juggle at any given moment? Five? Ten? Twenty? Between your email accounts, banking sites, credit card sites, and more, it's not difficult to envision having a dozen or more different secure logins to manage. Short of writing your passwords down and compromising your security, what can you do? For starters, you can get a copy of today's discount software promotion - RoboForm Everywhere!
Labels:
Giveaway,
RoboForm Everywhere
Friday, March 16, 2012
What is Proxy Server? - Security Term
In an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.
Labels:
Proxy Server,
Security Term
Thursday, March 15, 2012
Kaspersky Internet Security 2013 Beta [download now]
Kaspersky Lab is the clear victor, as today they’ve released the first beta of Kaspersky Internet Security 2013.
Stay ahead of the threats with Kaspersky Internet Security 2013.
Stay ahead of the threats with Kaspersky Internet Security 2013.
Labels:
2013,
Beta,
Kaspersky Internet Security,
Security Downloads
Tuesday, March 13, 2012
What is Server? - Security Term
1) In information technology, a server is a computer program that provides services to other computer programs (and their users) in the same or other computers.
2) The computer that a server program runs in is also frequently referred to as a server (though it may be used for other purposes as well).
3) In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs.
2) The computer that a server program runs in is also frequently referred to as a server (though it may be used for other purposes as well).
3) In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs.
Labels:
Security Term,
server
Subscribe to:
Posts (Atom)