Vol 9 02-Nov-09
You're receiving this newsletter because you are a valued contact of Qadit Systems.
Not interested anymore? Unsubscribe. Having trouble viewing this email? View it in your browser.
Qadit Systems Qadit's SecureITy Bulletin
Information is power. Secure IT.

Economic Value of Threat
Is it time to consider economic value of threat when rating a vulnerability?

Currently vulnerability ratings considers various factors such as difficulty level, CIA impact, public availability, etc. Given the commercial nature of exploits that are hitting computers these days, is it time to evaluate a threat from economic impact point of view? Read More.


Clustering vs Mirroring vs Log Shipping vs Data Replication

Availability and Redundancy is a key consideration for data storage.

There are quite a few options available for ensuring high availability and redundancy. Some common options are Clustering, Mirroring, Log Shipping and Data Replication. So what is the difference between these? Read More.


Cold Boot Attack

A way to bypass encryption?

Here is a method to retrieve credentials from memory of a switched off system. Read More.

In Other News & Views:

No Work No Pay? Not anymore ..
An interesting real-life story of getting paid without working. Read More.

IT Act 2000 with sharper teeth !!
The Information Technology (Amendment) Act 2008 has come into force from Oct 27. So what are the key changes? Read More.

Internet is 40 !!
Oct 29, 1969 was the day when the first internet message was sent. Read More.

Tech Terminology Demystified
What is HTTP?
Find out here.


Forward
Know someone who might be interested in this mail? Kindly forward it.

Unsubscribe
Not interested in receiving this email in the future? Unsubscribe.
Read more interesting news and articles at Qadit's SecureITy blog
For further info contact :
Qadit Systems & Solutions Pvt Ltd,
3 Sarojini Street, Mahalingapuram, Chennai 600 034
Tel: 044-2817 3034 / 044-6547 7225
Email: security@qadit.com
<> ERP Audits <> ISO 27001 <> GRC <> IT Audits <> Website Security Audits <>
Copyright (C) 2009 . All rights reserved.