Domain theft and the possibilities for recovery of the stolen domain names
Daniel published an article on Domain theft and the possibilities for recovery of the stolen domain names. In order to gain access to the article, please click here . You can also look at Advanced Penetration Testing, Ethical Hacking, and Advanced Persistent Threat course offered by InfosecInstitute.
Photo: the Booklight, http://www.flickr.com
Second UDRP Victory !!!
An Uniform Domain-Name Dispute-Resolution Policy (UDRP) complaint written and submitted to the Czech Arbitration court by Daniel was accepted. As a result, the domain names BLOGTEMPLATE4U.COM and DHETEMPLATE.COM were transferred to the Complainant. In order to read the full decision of the Panel, please visit: http://www.adr.eu/adr/decisions/decision.php?dispute_id=100510
Photo: NCinDC,...
Legal and Technological Concerns Regarding the Use of BIOS Anti-theft Technologies
Daniel Dimov published an article on Legal and Technological Concerns Regarding the Use of BIOS Anti-theft Technologies. In order to gain access to the article, please click here. You can also look at Advanced Penetration Testing, Ethical Hacking, and Advanced Persistent Threat course offered by InfosecInstitute.
Photo: Richard Masoner / Cyclelicious, http://www.flickr.com
Our Victory !!!
An Uniform Domain-Name Dispute-Resolution Policy (UDRP) complaint written and submitted to the Czech Arbitration court by Daniel was accepted. As a result, the domain name ACHARYAINDUPRAKASH.NET was transferred to the Complainant. In order to read the full decision of the Panel, please visit: http://www.adr.eu/adr/decisions/decision.php?dispute_id=100498 .
Photo: NCinDC, flickr.com.
The advantages of system automation tools in remote management systems (White Paper)
1. Introduction
System automation tools are used for comprehensive systems management, job scheduling, monitoring, and control of both system and application processes.
This paper discusses the general benefits of system automation tools (Section 2) as well as the benefits of particular automation tools. The particular tools examined in this section include managed antivirus software...
Welcome to my new website!
Dear Visitor,
after several days of hard work on this website, I am glad to tell you that it has just been finished. The website contains information about myself and my services. Moreover, in the website, you can find blog entries dealing with Internet law issues.
I sincerely hope that the website will be helpful to you. If you have any comments and questions, please send them to me by using...
Examples of practices of reporting information security incidents
1. Introduction
The aim of this document is to identify and analyze examples of practices of reporting information security incidents.
The document was prepared by surveying various sources related to the field of reporting information security incidents. These sources include, but are not limited to, literature, laws, codes of conduct, best practices, and websites of organizations managing...
The benefits of the cloud vs on-premise email archiving (Whitepaper)
1. Executive summary
The aim of archiving email solutions is to help organizations address various concerns, such as recovering deleted email messages, providing information to courts in case of an e-discovery hearing, complying with regulations requiring installation of email archiving software.
The traditional solution to these concerns is the use of on-premise email archiving. While...