Most articles on computer crime related news are at:
More articles on computer crime related news:
MENCURI PASSWORD DENGAN HOME KEYLOGGER foxit-handayani.co.cc 3 Mar 2011 | 02:13 pm
Penulis sengaja di awal-awal terbentuknya blog ini menulis postingan yang mengandung unsur kriminalitas (computer crime). Bukan bermaksud mengajak, tetapi sebagai sebuah pengetahuan semata. Penulis ha...
Considering Storage as a Service dev.cleversafe.org 24 Mar 2011 | 05:30 am
I recently wrote an article for Computer Technology Review on the topic of Storage as a Service, and in particular, how one should weigh the cost and scaling benefits against security. The conclusion...
JVP and Computer Crimes (a.k.a. Jilmart) subtlesl.wordpress.com 2 Mar 2010 | 08:08 pm
One First, JVP claimed that someone hacked hicorp.us to make it look like that HiCorp’s boss is Danuna Tilakaratne. They said they verified the “hacking” with HiCorp representatives. මේ අතර අප මේ සම...
How can I make the most of my article submitter software? recent-topics.blogspot.com 30 Mar 2011 | 04:30 pm
How can I make the most of my article submitter computer software? Post by Raj Kumar Sharma
 
 
 
 
 
 
 If you are serious about Ezine post writing you do will need an report sub...
Becoming A Computer Forensics Expert: What Kind Of Coursework Is Needed? computer-forensics-training.org 29 May 2011 | 04:44 am
Computer crime is on the rise, and a specific kind of specialist is now in high demand: the computer forensics specialist. Jobs in the computer forensics industry are experience huge growth and are we...
What is meant about the NN devices numericalcontrol.blogspot.com 1 Jun 2011 | 06:40 am
Continued from the article "Intelligent computer numerical control unit" Now we will discuss about the description of the NN itself. Let's look at the picture "Schematic lay-out of NN device" Schemat...
Matryoshka in Flash blog.threatexpert.com 20 Aug 2010 | 02:13 pm
Second part of the article from the Crime Scene Investigation:Internet series has now been published by c't magazine. This time the Action Script's p-code deobfuscation technique is illustrated. You...
Digital Forensics atl-datarecovery.com 2 May 2012 | 04:40 am
Digital Forensics Solutions For Anyone Digital Forensics can work for you if you need it. Are you a victim of computer crime? Do you need to find or verify evidence from a crime that was done throug...
BrowserSpy.dk mentioned in computer.org article browserspy.dk 4 May 2010 | 04:49 am
Once again BrowserSpy.dk is in the media. This time it's an article for computer.org about how browser fingerprints threaten your online privacy. Go ahead and read the entire article. The section ab...
Cyber Insurance: Means to Absorb Financial Losses crazybulb.com 30 Aug 2011 | 04:49 am
Cyber Insurance is a term you have probably never heard about. Since 1990, the web world has been developing at a very rapid rate and so has cyber crime. According to the FBI Computer Crime Survey in ...