web-archive-net.com » NET » S » SHORTINFOSEC.NET

Total: 84

Choose link from "Titles, links and description words view":

Or switch to "Titles and links view".
  • Information Security Short Takes: Rebranding a free E-mail domain - strategic blunder
    desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Rebranding a free E mail domain strategic blunder I am using several free e mail services mainly for reasons of insufficient quotas But for more then 7 years my primary e mail address hasn t changed It is a free service hosted by a local telco provider with only 100 MB quota and relatively poor spam protection I have maintained it simply because a huge number of my contacts and registrations on different sites on the Internet is bound to this address It is like maintaining a mobile phone number on an expensive mobile telephony provider simply because it is the number that everyone knows Yesterday i received a memo by the telco provider that it will go through a rebranding process This rebranding process will include the change of the domain name of the free e mail service All incoming emails to the original domain will still be received but all outgoing e mails sent from a webmail interface will be with a sender new domain com And all this change will happen in 2 weeks The idea of the telco provider is that using this change in domain name they will immediately raise the profile of the new brand Naturally you give something for free in order to gain something else customers of other service media attention brand recognition In a free service there are 2 types of customers the casual users which just registered because it is free and comprise 80 of all users and the power users which actually use the service as their primary service and comprise the remaining 20 It is the power users that frequently circulate e mails with a certain brand thus promoting the brand It is the power users the operator wants not the freebie hunters But here s the rub lets analyze what a power user of a certain e mail service does He She is subscribed to automatic services or mailing lists All automatic services are only validating a command if it is received from my original registered e mail address The partners and friends of the power user usually have e mail rules in their mail clients which manage e mail based on the sender address It is not a small effort to attempt to inform all the persons with which one communicates of the e mail domain rebranding Such information will again be sent through e

    Original URL path: http://www.shortinfosec.net/2008/04/rebranding-free-e-mail-domain-strategic.html (2016-04-28)
    Open archived version from archive


  • Information Security Short Takes: Reminder - Information Security and Strategy Carnival
    Testing Suite Security for idiots and others that care blogarama the blog directory Hardware and Software Tutorials that Count Blog Archive 2014 1 January 1 2013 2 November 1 October 1 2012 8 July 1 June 1 March 1 February 1 January 4 2011 16 December 1 September 1 August 2 July 1 June 6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Reminder Information Security and Strategy Carnival Reminder only 4 more days to submit your blog post on the Information Security and

    Original URL path: http://www.shortinfosec.net/2008/04/reminder-information-security-and.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Information Security and Strategy Carnival
    An Excellent Penetration Testing Suite Security for idiots and others that care blogarama the blog directory Hardware and Software Tutorials that Count Blog Archive 2014 1 January 1 2013 2 November 1 October 1 2012 8 July 1 June 1 March 1 February 1 January 4 2011 16 December 1 September 1 August 2 July 1 June 6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Information Security and Strategy Carnival I am proud to announce that the ShortInfoSec Blog will be hosting a

    Original URL path: http://www.shortinfosec.net/2008/04/information-security-and-strategy.html (2016-04-28)
    Open archived version from archive

  • Information Security Short Takes: Update: Recover the PC from Vista Stuck on Configuring Updates
    June 6 May 3 March 1 January 1 2010 47 December 2 November 7 October 8 September 6 June 1 May 1 April 2 March 13 February 1 January 6 2009 70 December 13 November 17 October 4 July 1 June 2 April 6 March 8 February 9 January 10 2008 130 December 5 November 4 October 3 September 2 August 20 July 27 June 25 May 15 April 18 March 1 February 4 January 6 Alexa Rank Follow me on Twitter Recent Posts Maintaining quality in outsourcing telco services Engaging a team for a security analysis Hacking Virtual Machines Part 1 Sniffing Mac Antivirus Staying careful and safer Steganography Passing through the defenses Choosing a Disaster Recovery Center Location Avoiding security complications when servicing desktop equpment Fuzzing with OWASP s JBroFuzz Mitigating Risks of the IT Disaster Recovery Test Internet Security Categories antivirus 2 audit 1 biometrics 1 Blog carnival 8 business continuity 9 competition 2 Computer security 42 Databases 3 disaster recovery 2 encryption 13 forensics 11 fraud 7 GPS 1 How To 29 Incident Management 7 information security 194 information strategy 78 Instant Messaging 2 malware 1 microsoft 9 Network security 22 penetration testing 38 Physical security 4 privacy 21 SLA 6 software development 14 Solution building 34 steganography 2 Templates 2 training and certification 4 trojan 1 windows 6 Site Meter BlogCommunities Update Recover the PC from Vista Stuck on Configuring Updates While my first priority was to recover the data from the laptop i also looked into the actual machine recovery I was able to boot into Vista System Recovery Options from the Vista DVD and chose System Restore Amazingly Vista was responsible enough to create restore points before installing the updates that sent it crashing So i chose the restore point before the installation

    Original URL path: http://www.shortinfosec.net/2008/02/update-recover-pc-from-vista-stuck-on.html (2016-04-28)
    Open archived version from archive