Security Guideline
Document Malware Defense Guideline
What is Document Malware?
Everyone should familiar with the term “Malware”; however, many people may not know how malware works. “Malware” is a general terminology and can be classified based on its operating mechanism. Most common malwares are Trojan, Worm...
28 Feb 2012 5309 Views
"Autorun virus" Removal Procedure
Please click to download "Autorun virus" Removal Procedure
22 Jan 2009 6120 Views
SQL Injection Defense Guideline
Please click to download SQL Injection Defense Guideline
11 Aug 2008 6326 Views
SME Information Security Guideline 2007
Please click to download SME Information Security Guideline 2007
30 Aug 2007 6056 Views
Guideline for Prevention of Spyware and other Potentially Unwanted Software
Please click to download Guideline for Prevention of Spyware and other Potentially Unwanted Software
17 Jun 2006 5740 Views
Home PC Baseline Security Self-Assessment Checklist
Please click to download Home PC Baseline Security Self-Assessment Checklist
17 May 2006 5655 Views
"MarketScore" Removal Procedure
Please click to download "MarketScore" Removal Procedure
20 Apr 2005 5359 Views
The Safety Mail Guide - published by AOEMA
Please click to download The Safety Mail Guide - published by AOEMA
15 Feb 2005 6032 Views
The Safety Net Guide - published by AOEMA
Please click to download The Safety Net Guide - published by AOEMA
15 Feb 2005 5508 Views
Handling Email Storm generated from Worms with Spoofed Sender
Description Latest computer viruses employed email harvesting techniques to get email addresses from the victim's hard disk, and insert these email addresses in both the sender and recipient fields of the infected email and it is therefore difficult to trace the origin of the sender...
29 Jan 2004 6104 Views