Skip to main content

Security Guideline

Filter by:

Document Malware Defense Guideline

  What is Document Malware?   Everyone should familiar with the term “Malware”; however, many people may not know how malware works. “Malware” is a general terminology and can be classified based on its operating mechanism. Most common malwares are Trojan, Worm...
Release Date: 28 Feb 2012 5450 Views

"Autorun virus" Removal Procedure

Please click to download "Autorun virus" Removal Procedure
Release Date: 22 Jan 2009 6208 Views

SQL Injection Defense Guideline

Please click to download SQL Injection Defense Guideline
Release Date: 11 Aug 2008 6410 Views

SME Information Security Guideline 2007

Please click to download SME Information Security Guideline 2007
Release Date: 30 Aug 2007 6141 Views

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Please click to download Guideline for Prevention of Spyware and other Potentially Unwanted Software
Release Date: 17 Jun 2006 5832 Views

Home PC Baseline Security Self-Assessment Checklist

Please click to download Home PC Baseline Security Self-Assessment Checklist
Release Date: 17 May 2006 5744 Views

"MarketScore" Removal Procedure

Please click to download "MarketScore" Removal Procedure
Release Date: 20 Apr 2005 5444 Views

The Safety Mail Guide - published by AOEMA

Please click to download The Safety Mail Guide - published by AOEMA
Release Date: 15 Feb 2005 6109 Views

The Safety Net Guide - published by AOEMA

Please click to download The Safety Net Guide - published by AOEMA
Release Date: 15 Feb 2005 5593 Views

Handling Email Storm generated from Worms with Spoofed Sender

Description Latest computer viruses employed email harvesting techniques to get email addresses from the victim's hard disk, and insert these email addresses in both the sender and recipient fields of the infected email and it is therefore difficult to trace the origin of the sender...
Release Date: 29 Jan 2004 6268 Views