Security Guideline
Document Malware Defense Guideline
What is Document Malware?
Everyone should familiar with the term “Malware”; however, many people may not know how malware works. “Malware” is a general terminology and can be classified based on its operating mechanism. Most common malwares are Trojan, Worm...
Release Date: 28 Feb 2012
5450 Views
"Autorun virus" Removal Procedure
Please click to download "Autorun virus" Removal Procedure
Release Date: 22 Jan 2009
6208 Views
SQL Injection Defense Guideline
Please click to download SQL Injection Defense Guideline
Release Date: 11 Aug 2008
6410 Views
SME Information Security Guideline 2007
Please click to download SME Information Security Guideline 2007
Release Date: 30 Aug 2007
6141 Views
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Please click to download Guideline for Prevention of Spyware and other Potentially Unwanted Software
Release Date: 17 Jun 2006
5832 Views
Home PC Baseline Security Self-Assessment Checklist
Please click to download Home PC Baseline Security Self-Assessment Checklist
Release Date: 17 May 2006
5744 Views
"MarketScore" Removal Procedure
Please click to download "MarketScore" Removal Procedure
Release Date: 20 Apr 2005
5444 Views
The Safety Mail Guide - published by AOEMA
Please click to download The Safety Mail Guide - published by AOEMA
Release Date: 15 Feb 2005
6109 Views
The Safety Net Guide - published by AOEMA
Please click to download The Safety Net Guide - published by AOEMA
Release Date: 15 Feb 2005
5593 Views
Handling Email Storm generated from Worms with Spoofed Sender
Description Latest computer viruses employed email harvesting techniques to get email addresses from the victim's hard disk, and insert these email addresses in both the sender and recipient fields of the infected email and it is therefore difficult to trace the origin of the sender...
Release Date: 29 Jan 2004
6268 Views