Search Results for: Security

Cyber-Crimes And Cyber-Security Bill – Are Your Downloads Authorized

Should you be installing something from the Web, you’d be wise to examine whether or not is authorized what you’re doing, your activities might be prejudicial to the information operator. The Cyber-Crimes and Cyber Security Bill (the Bill) is available for public comment until 30 November 2015 and plans to create a legal framework that …

Cyber-Crimes And Cyber-Security Bill – Are Your Downloads Authorized Read More »

Staying Secure with Passwordless Authentication Methods

When Sir Tim Berners-Lee conceived the World Wide Web in 1989, he could hardly have foreseen the manifold spidery pathways that would evolve to span the globe. The internet certainly changed the world, but it also brought to light a need for security measures that hadn’t previously existed. Enter: passwords. After being introduced in the …

Staying Secure with Passwordless Authentication Methods Read More »

Ethical Hacking and Penetration Testing Techniques

In the digital age, securing networks is paramount. This article delves into ethical hacking and penetration testing techniques – key instruments in the cybersecurity toolkit to defend against malicious threats. Exploring the World of Ethical Hacking: Techniques and Tools Ethical hacking employs a myriad of techniques and tools. Social engineering tests human responses to cyber …

Ethical Hacking and Penetration Testing Techniques Read More »

Privacy policy

edenz.ac.nz (“EDENZ”, “we”, “us”, or “our”) respects your privacy. This privacy policy (“Policy”) applies to information we collect when you access our website and other websites or online services that link to this Policy and are operated by us (collectively, the “Sites”). Collection of Information We may collect the following kinds of information when you …

Privacy policy Read More »

About us

EDENZ is a digital network that is committed to empower people to realize their fundmantal commitment to education – to make a real and lasting difference. We have been in the education business for over 20 years. EDENZ is a result of decades of passion for science and teaching. Our networks methodology has shown the …

About us Read More »

Does my business need a server?

Having your own IT network can make everyday operations much easier. But do you need your own server? Having your own network of servers and other IT equipment can make everyday life and efficiency in a craftsman’s business much easier. It’s all about getting the most out of your own processes. But if you want …

Does my business need a server? Read More »

The Innovations Of Linux 4.17

Linux 4.17 provides protection against the processor vulnerability Specter v4 aka Speculative Store Bypass (SSB) – but mostly it is inactive, because it needs microcode updates which Intel still has to release.

Protecting Private Keys – Keeping Your Keys Private

Recently D-Links was in the News – because private keys for code signing were accidentally publicized. It shows how important it is to ensure that security measures to protect private keys are taken. The Taiwanese networking company known as a manufacturer of wireless routers, network switches, and security cameras, inadvertently released one of its private …

Protecting Private Keys – Keeping Your Keys Private Read More »

The Difference Between VPN and SmartDNS

Streaming or making use of VPN? Anyone dealing with geo-blockades, anonymity on the Internet and Internet censorship will, over time, come across two technologies that help to remove geo-blockades and improve anonymity on the Internet: VPN and SmartDNS. Certain websites and online services such as Hulu, Netflix, Spotify etc. are only accessible at certain locations …

The Difference Between VPN and SmartDNS Read More »