Welcome to new and improved secureitnetworks.net. Articles are currently in process of migration so number of available posts is limited, but will increase in coming days. There will be a lot of new interesting information as well so check the website daily for new articles.

You will find here a lot useful information about IT with emphasis on networking and security. The main purpose of this website is to publish information about technical tips and tricks as well as general information about technologies within IT field. As name suggest hopefully it will grow into library of technical knowledge and place to visit for everyone who’s looking for quick answers to day-to-day problems and challenges.

Enjoy reading!

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>

Information Security RISK response strategies

  Risk Mitigation    Risk mitigation is the practice of the elimination of, or the significant decrease in the level of risk presented. Examples of risk mitigation can be seen in everyday life and are readily apparent in the information technology world. Risk Mitigation involves applying appropriate control to reduce risk. For example, to lessen …

Read more

Time to crack passwords

Below table represents estimated time to crack passwords based on passphrase lenght and complexity.   Of course time may differ depending on number of factors like: Using dictionary words in passwords may allow almost instant crack ( for example if “rainbow tables” are beign used) Hardwa used (CPU/GPU power, RAM etc.) Application used to crack …

Read more