Category Archives: Ethical Hacking

Articles about security researchers who aims to catch malicious users within organizations as well as black hat hackers who operates remotely.

Comodo Internet Security 2010 brushed up: Part 2

The firewall itself is very robust and includes an intrusion detection system (or HIPS feature — called “Defense+” in Comodo). It also provides buffer overflow protection (a “memory firewall”), a training mode to automatically create rules for programs you trust, and a parental control password to automatically block all alerts (so children and inexperienced users […]

1 4 5 6