IT Nota

  • Home
  • How To
  • .NET
  • WordPress
  • Contact

How to Enable TLS 1.2 as the Default Security Protocol on Windows Servers

Transport Layer Security (TLS) are cryptographic protocols designed to provide communications security over a computer network, typically between a website and a browser. TLS 1.0 and its deprecated predecessor, SSL are vulnerable to some well-known security issues such as POODLE and BEAST attacks. According to NIST, these vulnerabilities cannot be fixed or patched, therefore all companies, … [Read more...]

October 12, 2018 Filed Under: How To Tagged With: Information Security, Microsoft, Windows Server

How to Create Key Pair Using Kleopatra (GnuPG)

If you need to find a free solution to encrypt file or email, Gpg4win (GNU Privacy Guard for Windows) may be more than enough encryption than what you need. It is a free software and pretty straightforward to install. Before you can use it though, you need to create a key pair first and this may be confusing to beginners. Here are the steps to generate a key pair in GPG4Win Kleopatra: Launch … [Read more...]

October 1, 2018 Filed Under: How To Tagged With: Information Security, Internet, Windows

Live Cyber Attacks Map

A live cyber attacks map from various companies may give you a different outlook on Internet security. Fire Eye Cyber Threat Map No longer available The explanation from Norse Security's website: "Every second, Norse collects and analyzes live threat intelligence from darknets in hundreds of locations in over 40 countries. The attacks shown are based on a small subset of live flows … [Read more...]

July 7, 2014 Filed Under: Internet Tagged With: Information Security

Heartbleed Bug, What You Need to Do

For the past two years (since March 2012), millions of websites may have been leaking sensitive data due to a major flaw in the OpenSSL software that are used to encrypt and transmit Internet data. The Heartbleed bug as called by the researchers who discovered it, would enable hackers to obtain a compromised site's encryption keys, which makes all passing data basically available for them to … [Read more...]

April 10, 2014 Filed Under: Internet Tagged With: Information Security

How to Activate Google 2-Step Verification

With a huge increase in email accounts getting hacked, you need more than just a strong password to protect them. Fortunately for Gmail users, Google provides a "2-step verification" that will tell you by either sending a text message to your registered cell phone if someone tries to gain access to your email. This feature has been out for a while but many people are still not aware about it. … [Read more...]

May 26, 2012 Filed Under: How To Tagged With: Google, Information Security

  • « Previous Page
  • 1
  • 2
Buy me a coffee Support this site
Buy Me a Coffee?

Categories

  • .NET
  • Coding
  • Cybersecurity
  • Database
  • How To
  • Internet
  • Multimedia
  • Photography
  • Programming
  • Resources
  • Review
  • Tips and Tricks
  • Uncategorized
  • Use Case
  • WordPress
  • Writing

Recent Posts

  • ESP Work Automation: Empowering Enterprises with Streamlined Workflows and Operational Efficiency
  • How to Search for a String in All Tables in a Database
  • How to Install Cryptomator on macOS
  • How to Turn On Advanced Data Protection for iCloud
  • How to Create SSH Keys

Recent Posts

  • ESP Work Automation: Empowering Enterprises with Streamlined Workflows and Operational Efficiency
  • How to Search for a String in All Tables in a Database
  • How to Install Cryptomator on macOS
  • How to Turn On Advanced Data Protection for iCloud
  • How to Create SSH Keys

Tags

.NET ASP.NET Cdonts Dll Classic ASP Code Editor ETL FSharp Genesis Framework Git Google HP Asset Manager HTML5 Hugo IIS Information Security Internet Internet Information Services iOS JAMStack JavaScript Linux macOS Microsoft Microsoft SQL Server MVC PHP PowerShell Python Simple Mail Transfer Protocol Smtp Server SQL SQL Server SSIS SSMS SSRS Sublime Text Visual Studio Visual Studio Code VPN Web Server Windows Windows 8 Windows 10 Windows 2012 Windows Server

Copyright © 2011-2023 IT Nota. All rights reserved. Terms of Use | Privacy Policy | Disclosure