Skip to content

Utilize Windows

  • Home
  • Contact Us
  • Computer
  • Hardware
  • Networking
  • E-books

Security

Securing Your PC: How to Choose an Antivirus Software For Windows 10

November 28, 2022April 17, 2020 by Husein Gradasevic

Protecting your PC is something you should definitely prioritize. Fortunately, your Windows 10 PC is already partially protected with its …

Read more

Categories Computer, Security

Data Loss Prevention and Protection

November 28, 2022December 28, 2018 by Husein Gradasevic

Data in today’s digital world is no less than an asset. All the personal pictures, documents, files, folders etc comprise …

Read more

Categories Computer, Security

Using Proxies to Protect Your Brand

November 28, 2022December 26, 2018 by Husein Gradasevic

With hacking, malware, and major data breaches at an all-time high, cybersecurity has become a very real issue for burgeoning …

Read more

Categories Computer, Security

What is Ethical Hacking

November 28, 2022October 9, 2018 by Husein Gradasevic

Hacking  is an attempt to gain unauthorized access to data in a system or to make a system do something …

Read more

Categories Computer, Security

Malware targeting the Internet of Things

November 28, 2022October 2, 2018 by Husein Gradasevic

When we talk about malware or cyber attacks, we only tend to think about PCs or phones. They certainly are …

Read more

Categories Computer, Security

General guidelines for securing operating systems and networks

November 28, 2022February 26, 2016 by Husein Gradasevic

When we want to strengthen the security of the system, we we need to follow some basic guidelines. For hardening …

Read more

Categories Computer, Security

Security Issues Related to Network Media and Removable Media

November 28, 2022February 11, 2016 by Husein Gradasevic

Media security has two primary components: cabling media security and removable media security. Cabling Security Cabling is often an overlooked …

Read more

Categories Computer, Security

Key Management Principles

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn about some common principles and terms when it comes to key management. Prerequisites: you have to know …

Read more

Categories Computer, Security

Introduction to Public Key Infrastructure (PKI)

November 28, 2022December 3, 2012 by Husein Gradasevic
Utilizewindows

Before you start Objectives: Learn what is PKI, what are its components, and how do they work together. Prerequisites: you should know …

Read more

Categories Computer, Security

Examples of Cryptographic Attacks

November 28, 2022December 3, 2012 by Husein Gradasevic

Before you start Objectives: Learn about general cryptographic attacks, and how to deal with them. Prerequisites: no prerequisites. Key terms: attack, password, attacker, …

Read more

Categories Computer, Security
Older posts
Page1 Page2 … Page4 Next →

Recent Posts

  • Introduction to Home windows XP – Up to date
  • Methods on The right way to Repair Home windows Error Code 0x0 0x0
  • Wifi 5 vs Wifi 6 – Ought to You Improve or Not?
  • Distinction between WEP, WPA, WPA2, WPA3, WPS WiFi Safety
  • What are FTP, SFTP, FTPS & TFTP and their variations
  • Cloud
  • Computer
  • Hardware
  • http
  • Linux
  • Networking
  • php
  • Security
  • Server
  • Web
  • Windows
  • Windows 10
  • Windows 7
  • Windows 8
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows Vista
  • Windows XP

Contact us

Email: marketing[at]shantelllc.com

Search Here

More

  • Contact Us
  • Terms Of Use
  • Cookie Policy
    • Opt-out preferences
  • Disclaimer
  • Privacy Policy
  • Sitemap
© 2023 - Utilize Windows
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage vendors Read more about these purposes
View preferences
{title} {title} {title}