Tag Archives: IT security

Dealing With the Threat Changed – The Stringent Values of Lawfullness

By Kamini Kandica Abdool Many times when using the Internet, we are faced with threats that interfere with our daily activities, those that pose a risk, and some that put us in danger. Our activities, the pages we visit, the … Continue reading

Posted in Uncategorized | Tagged , , , , | Leave a comment

Mobile Phones and IT security

By Kamini Kandica Abdool Mobile phones now have Internet access, Email, Texing, You-Tube, streaming radion and social media.  Many times, with that comes access to open ports on your cell phone from hackers and other preying individuals. How do you … Continue reading

Posted in Uncategorized | Tagged , , , | Leave a comment

Safety Restrictions or Definitions

 By Kamini Kandica Abdool IT Security is currently being rebuilt to include the needs of the whole world. How do we though, come up with borders that will define and integrate better security measures rather than pose heightened restrictions that … Continue reading

Posted in Uncategorized | Tagged , , , , , | Leave a comment

Providing a Fundation for IT Security with Data

 By Kamini Kandica Abdool IT Security, an important part of dealing with IT issues and providing safety has a means to create a better foundation to manage better the move of the Technology sector to a more global environment and … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | Leave a comment

Overclocking Security Precautions – Systems at Risk

By Kamini Kandica Abdool Overclocking  – a popular speed-or-upper or system enhancer.  It is usually included as a BiOS update file that comes with the motherboard cd or available on the download site for computer or system board. Speed is … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , | 2 Comments

The Proposition of Policy and Technology Reaction

By Kamini Kandica Abdool Information is important and is usually the deliverable on paper and with it. Hence the reference of white paper and newspaper that have showing up in technology news recently, especially globally. Just to define the terms … Continue reading

Posted in Uncategorized | Tagged , , , , , , , , , , , , | Leave a comment

What Do You Do When MAlware Attacks a Virus?

By Kamini Kandica Abdool I want to stick with my decision that viruses begin as good. Viruses are files that are written to take commands from various settings on a programs and come as part of most programs. Examples of … Continue reading

Posted in Uncategorized | Tagged , , , , , , | Leave a comment