Your participation in social networking can be turned against you but there are ways to make friends safely.
Please read this short article on Facebook security via the web site link below. With just a few careful steps, you can still enjoy social networking with piece of mind.
Facebook Safety: A Primer
PJL 30th April 2010
Friday, April 30, 2010
Thursday, April 29, 2010
Wednesday, April 28, 2010
Tuesday, April 27, 2010
Recognising Different Types Of Insiders
Insiders are people who play a key role in data leaks. Several different insider profiles are examined below. more
PJL 27th April 2010
PJL 27th April 2010
Monday, April 26, 2010
Divorce Rate On The Rise Again
This is really unfortunate news but as I sit here and shuffle more divorce documents over my desk in the last couple of months, divorce is definitely on the increase again.
It is a trend with the economy improving that people see an opportunity to get out of their debt situation and unhappy marriage relationship.
PJL 26th April 2010
It is a trend with the economy improving that people see an opportunity to get out of their debt situation and unhappy marriage relationship.
PJL 26th April 2010
Sunday, April 25, 2010
Laptop Computers Disappear
In the last few months there has been an increase in the theft of laptop computers from businesses. On all occasions there has been forced entry into premises and laptop computers stolen containing intellectual property.
I can't emphasise how important it is to ensure that laptop computers belonging to a business or person containing intellectual property, must either be secured in a monitored safe or kept in the company of an individual at all times, until the laptop computer can be secured appropriately.
I definitely don't see this trend to be a spate of laptop computer theft, due to a criminals needing cash payment for their stolen goods. This trend is more associated with a need to obtain competitive business intelligence, by breaking into & entering premises & stealing laptop computers containing intellectual property, to obtain a competitive business advantage or to sell intellectual property to business competitors.
PJL 25th April 2010
I can't emphasise how important it is to ensure that laptop computers belonging to a business or person containing intellectual property, must either be secured in a monitored safe or kept in the company of an individual at all times, until the laptop computer can be secured appropriately.
I definitely don't see this trend to be a spate of laptop computer theft, due to a criminals needing cash payment for their stolen goods. This trend is more associated with a need to obtain competitive business intelligence, by breaking into & entering premises & stealing laptop computers containing intellectual property, to obtain a competitive business advantage or to sell intellectual property to business competitors.
PJL 25th April 2010
Saturday, April 24, 2010
Investigating Cyber Espionage
Shadows in the Cloud is a report about how the India-focused spy ring employed the use of Twitter, Google Groups, Blogspot and Yahoo!Mail to automate the control of computers once they had been infected. more
PJL 24th April 2010
PJL 24th April 2010
Friday, April 23, 2010
Thursday, April 22, 2010
Wednesday, April 21, 2010
Tuesday, April 20, 2010
Monday, April 19, 2010
Sunday, April 18, 2010
Saturday, April 17, 2010
How MI5 Bugged 10 Downing Street Cabinet Prime Ministers For 15 Years (dailymail.co.uk)
MI5 used hidden electronic surveillance equipment to secretly monitor 10 Downing Street, the Cabinet and at least five Prime Ministers, The Mail on Sunday can reveal.
The extraordinary disclosure comes despite a succession of parliamentary statements that no such bugging ever took place.
And it follows a behind-the-scenes row in which senior Whitehall civil servants – backed by Prime Minister Gordon Brown – attempted to suppress the revelation. more
PJL 17th April 2010
The extraordinary disclosure comes despite a succession of parliamentary statements that no such bugging ever took place.
And it follows a behind-the-scenes row in which senior Whitehall civil servants – backed by Prime Minister Gordon Brown – attempted to suppress the revelation. more
PJL 17th April 2010
Friday, April 16, 2010
Thursday, April 15, 2010
Wednesday, April 14, 2010
PJL Online Store NEW Products: Find a Lower Price & Receive a 5% Discount
FIND A LOWER PRICE FOR THE 2 PRODUCTS BELOW AND WE WILL BEAT THAT PRICE BY 5%
PRICES LAST TILL THE END OF THE MONTH APRIL 2010
DCAMHUNTER Lowest Price $879.00 AUD
More information & place your order.
DCAMHUNTER
iTrail GPS Logger Lowest Price $299.00 AUD
More information & place your order.
iTrail GPS Logger
More information via the blog link below.
iTrail GPS Logger Information
PJL 14th April 2010
PRICES LAST TILL THE END OF THE MONTH APRIL 2010
DCAMHUNTER Lowest Price $879.00 AUD
More information & place your order.
DCAMHUNTER
iTrail GPS Logger Lowest Price $299.00 AUD
iTrail GPS Logger
More information via the blog link below.
iTrail GPS Logger Information
PJL 14th April 2010
Tuesday, April 13, 2010
Monday, April 12, 2010
Sunday, April 11, 2010
Saturday, April 10, 2010
How To Encrypt Emails In Outlook
Encrypting email is necessary in providing a high level of confidentiality with email communication.
The article we are providing via the web site link below, gives a detailed and comprehensive explanation on how to obtain a digital certificate with a certificate authority (CA), including how to apply a digital signature for creating digitally encrypted email using Outlook.
With further configuration of Outlook, you will then be able to send & exchange digitally signed encrypted email messages, with the use of a public key using Outlook.
Please view the full article by Mike Chapple, who will guide you in setting up your digitally signed encrypted email, using Outlook. more...
PJL 10th April 2010
The article we are providing via the web site link below, gives a detailed and comprehensive explanation on how to obtain a digital certificate with a certificate authority (CA), including how to apply a digital signature for creating digitally encrypted email using Outlook.
With further configuration of Outlook, you will then be able to send & exchange digitally signed encrypted email messages, with the use of a public key using Outlook.
Please view the full article by Mike Chapple, who will guide you in setting up your digitally signed encrypted email, using Outlook. more...
PJL 10th April 2010
iTrail GPS Logger
Introducing the iTrail. A passive GPS logger. Simply place the small iTrail unit wherever you like - your car, child's backpack, virtually anywhere for lawful tracking purposes.
This is new innovative miniature tracking technology sold by PJL at a reasonable price $299.00 AUD. more...
iTrail GPS Logger
PJL 10th April 2010
This is new innovative miniature tracking technology sold by PJL at a reasonable price $299.00 AUD. more...
iTrail GPS Logger
Friday, April 9, 2010
Crime Analysis & Investigation Computers & Technology
It should be recognised that in the past there has been much more of a reactive approach to investigating offences committed in relation to technology.
Cybercrime is now upon us and it needs to be controlled and reduced. The investigator needs to adopt technology & apply it to the investigative problems to assist in limiting the opportunities for those who commit offences. more...
PJL 9th April 2010
Cybercrime is now upon us and it needs to be controlled and reduced. The investigator needs to adopt technology & apply it to the investigative problems to assist in limiting the opportunities for those who commit offences. more...
PJL 9th April 2010
Thursday, April 8, 2010
Sherlock Holmes New Extended Movie Trailer
I enjoyed this film and recommend it to any one interested in investigation work. Even though the movie is not hugely involved with investigation matters, it is still quite surprising what the movie has to offer in investigations and the action keeps you alive right throughout the movie. 8.5/10
Further information
PJL 8th April 2010
Wednesday, April 7, 2010
Fraud & Electronic Commerce Article by PJL
Electronic Commerce has certainly automated the way in which every public sector, commercial entity and individuals do business with each other.
The need for efficient and effective pathways of financial transactions allows for exploitation of the new and emerging technologies that deliver products and services.
Opportunities for fraudulent behavior are emerging daily for those seeking to behave dishonestly. more...
PJL 7th April 2010
The need for efficient and effective pathways of financial transactions allows for exploitation of the new and emerging technologies that deliver products and services.
Opportunities for fraudulent behavior are emerging daily for those seeking to behave dishonestly. more...
PJL 7th April 2010
Subscribe to:
Posts (Atom)