Computers and computer software  support - find it on CompInfo
CompInfo - The Computer Information Center
The top one-stop reference resource for corporate IT, computers and communications
Millions of IT users world-wide rely on our Web-based support resources
Tell your colleagues and friends, and bookmark us at
Manufacturers Technical
Topic Centers
News Events Books Magazines Jobs Search Free Newsletter Add URL Add News/Events

Help on CompInfo
Find your way around CompInfo
HOME ( IT News ) page
Certification Resources
Free Newsletters
Keep up-to-date with news, events, resources, and special offers. Subscribe here
IT Support Centers
Technical Knowledge bases
Support Desk - Drivers, Documentation, etc.
Introduction Pages to Technologies
Product Reviews and Evaluations
White Papers, Articles and Reports
Download Software
Computer History, Dictionaries & Encyclopaedias
Information Centers
The latest News!
What's On - Computer Events
Find a Book
Technology Futures
Computer Magazines
IT Publishers
Looking for a Job?
Business Centers
Business Applications
VAR Business
IT Investors' Center
Computer Directories
Solution Providers
Service Providers
Maintenance Companies
Internet Service Providers
User Groups
And For Leisure ...
Non IT Sites
Add Your Information
Add Your Company's URL
Add News
Add Events
Promote Your Products and Services
Contact Us
Privacy Policy
Feedback on site changes

System Security

Beginners, Glossary and Background | Technical Knowledge Bases | News | Events | Books | Magazines | Manufacturers | Products and Reviews | White Papers, Reports and Articles | Training Tools | Where to buy | Where to get help | Trainers | News Groups, Discussion Forums, Mail Lists and FAQs | User Groups | Trade Associations

White Papers, Reports and Articles

 11 Common Backup Mistakes and How To Avoid Them
Enhanced Software Technologies, Inc.
  "Most people with computer experience know how critical their data is. From word processing documents to multi-tiered databases, accurate data storage and retrieval is an absolute must to get the job done right. So, why do so many people put off backing up their systems or networks until it is too late?"
 Executive Insights on Content Security (PDF format)
Computerworld October, 2000
  Security has become a major concern for every top-level executive whose business is increasingly dependent on e-commerce.
 Intrusion Prevention: The Next Step in IT Security
ClickNet Software July, 2000
  More and more companies are deploying collaborative computing environments and, as a result, undergoing a massive interconnection effort. At the same time, new system vulnerabilities are discovered and new intrusion techniques are developed at an amazing pace.
 IT Security and Systems Management
 Kerberos explained
Computerworld June, 2000
 Securing against Denial of Service attacks
Lincoln Stein March, 2000
  Denial of Service (DoS) is an attack designed to render a computer or network incapable of providing normal services. The most common DoS attacks will target the computer's network bandwidth or connectivity. Bandwidth attacks flood the network with such a high volume of traffic, that all available network resources are consumed and legitimate user requests can not get through. Connectivity attacks flood a computer with such a high volume of connection requests, that all available operating system resources are consumed, and the computer can no longer process legitimate user requests.


Keep me informed

©Copyright The Computer Information Center 1995 - 2000


The Computer Information Center provides information in good faith, but does not provide any warranties whatsoever, nor assume any legal liability or responsibility whatsoever, for the accuracy, completeness or usefulness of any of the information supplied. It is not in any way responsible, and has no legal liability, in respect of the contents of any other site referenced from this site. The ownership of all trademarks, etc. referred to on this site is acknowledged


01 November, 2000
Reseller Opportunities
Job Opportunities
Competitive prices for products and services
Middle East Web Attacks Might Spread West
Bug Watch: Can you trust mobile workers?
Hackers Penetrate Microsoft's Own Systems
Microsoft attack adds fuel to hacker crackdown
Was Hack Attack Microsoft's Own Fault?
.......... More News
SFProtect 2.0
.......... More Products
Computer Crime - Book titles
Cryptography - Book titles
Data Security - Book titles
Hacking - Book titles
Security - Book titles
.......... More Books
IT Security and Systems Management
.......... More White Papers
Compsec 2000 - the 17th World Conference on Computer Security, Audit and Control (London, United Kingdom) 1 Nov 2000 to 3 Nov 2000
SecureIT 2000 Summit (San Diego, Ca, United States) 3 Nov 2000 to 5 Nov 2000
European Internet Security Forum (London, United Kingdom) 8 Nov 2000 to 9 Nov 2000
ISEC Africa 2000 (Johannesburg, South Africa) 8 Nov 2000 to 10 Nov 2000
CSI 27th Annual Computer Security Conference and Exhibition (Chicago, IL, United States) 13 Nov 2000 to 15 Nov 2000
.......... More Events