Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share It With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

ADVERTISEMENT

Links 1 through 10 of 11 by Kris Hoet tagged security

Share It With Others!

"To illustrate this point, the report includes cumulative figures for the number of vulnerabilities found on a Windows PC with the 50 most widely-used programs. Five years ago, there were more first-party flaws (in Windows and Microsoft's other software) than third-party. Since about 2007, the balance shifted towards third-party programs. This year, third-party flaws are predicted to outnumber first-party flaws by two-to-one."

Share It With Others!

KeyLemon heeft een extra veiligheids laag toegevoegd aan het login proces op je computer door de Webcam al het zware werk te laten doen. In plaats van een wachtwoord invoeren, associeert KeyLemon 2.2 je gezicht met je profiel om in te loggen. Deze blijft regelmatig checken of de persoon die achter de computer zit nog steeds dezelfde is als die van het profiel dat bekend is. Als de computer het idee heeft dat het niet klopt, neemt de Webcam een foto en gaat de computer automatisch over tot hibermate.

Share It With Others!

"Give me six lines written by the most honorable of men, and I will find an excuse in them to hang him." —Cardinal Richelieu

"We don't know enough about you." —Google CEO Eric Schmidt

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

The 1.3 million individuals whose data, including financial information, was stolen from Monster’s database may be larger than initially reported.

Share It With Others!

Welcome to a new blog from Microsoft. The focus of this blog is likely to be a little different from most other blogs you'll see on blogs.msdn.com. Microsoft employs some of the best hackers in the world and actively recruits them and develops them. Th

Share It With Others!

A recently disclosed fraud involving hundreds of thousands of people on the monster.com jobs Web site reveals the perils of leaving detailed personal information online, security analysts say.

Share It With Others!

ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT