Category: Information Security
Anti-Spam(23)
Anti-Virus(11)
BitLocker(6)
Data Encryption(11)
SSL Certificate(3)
Two-Factor Authentication (2FA)(23)
User Privilege(1)
How to use VeraCrypt on Windows?
Read More →What is VeraCrypt?
VeraCrypt is an open source encryption software that allows you to create encrypted volume or drive on Windows, Mac and Linux. It is based on TrueCrypt and it solves many vulnerabilities and security issues found in TrueCrypt. VeraCrypt uses highly secure AES, Serpent and Twofish encryption ciphers and their combinations to encrypt your data. You […]
How to use Disk Utility to encrypt virtual disk (disk image) in Mac OS?
How to perform FileVault 2 whole drive encryption in Mac OS?
What is FileVault 2 in Mac OS?
FileVault 2 is built into the OS X operating system. It is an integral security feature for Mac that allows you to encrypt the contents of your whole drive. It uses full disk, XTS-AES 128 encryption to help keep your data secure. FileVault 2 requires OS X Lion or later, and OS X Recovery installed […]
What is BitLocker Drive Encryption?
BitLocker is a built-in feature of Windows that allows you to easily encrypt entire disk drives or removable devices. When enabled, it encrypts the data on the computer or removable device and restricts access using a password or recovery key. It helps prevent the theft of data on that disk if the computer or removable […]
How can I find from ESET NOD32 Virus Information Center?
ESET maintains a list of virus information which includes what does it harm and its source and how does it infect other machines. The list is quite large, and it is listed in alphabetic order. You may look for these information for a particular virus in your own interest. Click here to for details. Signature […]
How to update signature in ESET?
Although ESET provides automatic signature update for the users, you will still be able to trigger the update whenever you want by yourself. The following procedure will allow you to check for the latest virus signature database updates in Windows ESET product. Open the main program window by double-clicking the ESET icon in your Windows […]
How to handling infected files in ESET?
Depending on the type of threat, your ESET program might clean, block, or quarantine one or multiple files, block access to a website, make changes to online communication settings. See below for a ‘Threat found’ notifications that you might see from your ESET product: This type of notification is displayed when your ESET product detects a […]