Monday, January 25, 2010

♥♥♥What is privacy protection the law

what is privacy protection the law implementing and ensuring compliance with the Data Protection, influencing thinking on privacy and processing of personal information ... This reference guides you through the fragmented and conflicting environmental protection laws and regulations put into effect in recent ...

'!♥♥what is privacy♥♥

When something is private to a person, it usually means there is something within them that is considered inherently special or personally sensitive. The degree to which private information is exposed therefore depends on how the public will receive this information, which differs between places and over time. Privacy can be seen as an aspect of security — one in which trade-offs between the interests of one group and another can become particularly clear.In some countries individual privacy may conflict with freedom of speech laws and some laws may require public disclosure of information which would be considered private in other countries and cultures. Privacy may be voluntarily sacrificed, normally in exchange for perceived benefits and very often with specific dangers and losses, although this is a very strategic view of human relationships.

Monday, January 11, 2010

The computer criminals and their object?

Computer criminals are characterized by using software,and search data on special computer crimes and their investigation .. Specific computer crimes cover infringements when computer system is an object of crime commitment. became necessary because new forms of computer crime posed a threat not only to the traditional objects of criminal law protection, ...

....,.A Zero-Day Attack;.....

A zero-day attack is a virus or other exploit that is used to take advantage of a vulnerability in a computer application before a fix for the vulnerability ...In this sense, every new virus and variant of a malicious program is a "zero day attack" - malicious code that hasn't yet been analyzed in a lab. computer. See zero-day exploit. Computer Desktop Encyclopedia THIS DEFINITION IS FOR PERSONAL USE ONLY ...

Monday, January 4, 2010

what would you do?

for me.....the IT security consultant to fix the security problem at a manufacturing company.....
the last 8 months with three of the attacks making headlines for the negative.they have been given 90 days,All functional department that are involved in operation or production are integrated in one system,

Monday, December 14, 2009

Presentation in a competitive work setting effective communication and
presentation skills can make a critical difference for success.
hard work and good ideas,