Skip to main content

Security Guideline

Filter by:

Document Malware Defense Guideline

  What is Document Malware?   Everyone should familiar with the term “Malware”; however, many people may not know how malware works. “Malware” is a general terminology and can be classified based on its operating mechanism. Most common malwares are Trojan, Worm...
28 Feb 2012 5309 Views

"Autorun virus" Removal Procedure

Please click to download "Autorun virus" Removal Procedure
22 Jan 2009 6120 Views

SQL Injection Defense Guideline

Please click to download SQL Injection Defense Guideline
11 Aug 2008 6326 Views

SME Information Security Guideline 2007

Please click to download SME Information Security Guideline 2007
30 Aug 2007 6056 Views

Guideline for Prevention of Spyware and other Potentially Unwanted Software

Please click to download Guideline for Prevention of Spyware and other Potentially Unwanted Software
17 Jun 2006 5740 Views

Home PC Baseline Security Self-Assessment Checklist

Please click to download Home PC Baseline Security Self-Assessment Checklist
17 May 2006 5655 Views

"MarketScore" Removal Procedure

Please click to download "MarketScore" Removal Procedure
20 Apr 2005 5359 Views

The Safety Mail Guide - published by AOEMA

Please click to download The Safety Mail Guide - published by AOEMA
15 Feb 2005 6032 Views

The Safety Net Guide - published by AOEMA

Please click to download The Safety Net Guide - published by AOEMA
15 Feb 2005 5508 Views

Handling Email Storm generated from Worms with Spoofed Sender

Description Latest computer viruses employed email harvesting techniques to get email addresses from the victim's hard disk, and insert these email addresses in both the sender and recipient fields of the infected email and it is therefore difficult to trace the origin of the sender...
29 Jan 2004 6104 Views