|3DES||Triple Data Encryption Standard|
|AAA||Authentication, Authorization and Accounting|
|ACL||Access Control List|
|AES||Advanced Encryption Standard|
|AES 256||Advanced Encryption Standards, 256-bit|
|ARP||Address Resolution Protocol|
|AUP||Acceptable Use Policy|
|BCP||Business Continuity Planning|
|BIOS||Basic Input/Output System|
|CERT||Computer Emergency Response Team|
|CHAP||Challenge Handshake Authentication Protocol|
|CIRT||Computer Incident Response Team|
|CRL||Certification Revocation List|
|DAC||Discretionary Access Control|
|DDOS||Distributed Denial of Service|
|DEP||Data Execution Prevention|
|DES||Data Encryption Standard|
|DHCP||Dynamic Host Configuration Protocol|
|DLL||Dynamic Link Library|
|DLP||Data Loss Prevention|
|DNS||Domain Name Service|
|DOS||Denial Of Service|
|DRP||Disaster Recovery Plan|
|DSA||Digital Signature Algorithm|
|EAP||Extensible Authentication Protocol|
|ECC||Elliptic Curve Cryptography|
|EFS||Encrypted File System|
|ESP||Encapsulated Security Payload|
|FTP||File Transfer Protocol|
|GPU||Graphic Processing Unit|
|GRE||Generic Routing Encapsulation|
|HDD||Hard Disk Drive|
|HIDS||Host-Based Intrusion Detection System|
|HIPS||Host-Based Intrusion Prevention System|
|HMAC||Hashed Message Authentication Code|
|HSM||Hardware Security Module|
|HTTP||Hypertext Transfer Protocol|
|HTTPS||Hypertext Transfer Protocol over SSL|
|HVAC||Heating, Ventilation, Air Conditioning|
|IaaS||Infrastructure as a Service|
|ICMP||Internet Control Message Protocol|
|IKE||Internet Key Exchange|
|IMAP4||Internet Message Access Protocol v4|
|IPSEC||Internet Protocol Security|
|IRC||Internet Relay Chat|
|ISP||Internet Service Provider|
|KDC||Key Distribution Center|
|L2TP||Layer 2 Tunneling Protocol|
|LANMAN||Local Area Network Manager|
|LDAP||Lightweight Directory Access Protocol|
|LEAP||Lightweight Extensible Authentication Protocol|
|MAC||Mandatory Access Control / Media Access Control|
|MAC||Message Authentication Code|
|MBR||Master Boot Record|
|MDS||Message Digest 5|
|MSCHAP||Microsoft Challenge Handshake Authentication Protocol|
|MTU||Maximum Transmission Unit|
|NAC||Network Access Control|
|NAT||Network Address Translation|
|NIDS||Network-Based Intrusion Detection System|
|NIPS||Network-Based Intrusion Prevention System|
|NOS||Network Operating System|
|NTFS||New Technology File System|
|NTLM||New Technology LANMAN|
|NTP||Network Time Protocol|
|OVAL||Open Vulnerability Assessment Language|
|PAP||Password Authentication Protocol|
|PAT||Port Address Translation|
|PEAP||Protected Extensible Authentication Protocol|
|PGP||Pretty Good Privacy|
|PKI||Public Key Infrastructure|
|PPTP||Point-to-Point Tunneling Protocol|
|RADIUS||Remote Authentication Dial-in User Server|
|RAID||Redundant Array of Inexpensive Disks|
|RAS||Remote Access Server|
|RBAC||Role Based Access Control|
|RSA||Rivest, Shamir & Adleman|
|RTP||Real-Time Transport Protocol|
|S/MIME||Secure/Multipurpose Internet Mail Extension|
|SaaS||Software as a Service|
|SCAP||Security Content Automation Protocol|
|SCSi||Small Computer System Interface|
|SDLC||Software Development Life Cycle|
|SDLM||Software Development Life Cycle Methodology|
|SHA||Secure Hashing Algorithm|
|SHTTP||Secure Hypertext Transfer Protocol|
|SIM||Subscriber Identity Module|
|SLA||Service Level Agreement|
|SLE||Single Loss Expectancy|
|SMS||Short Message Service|
|SMTP||Simple Mail Transfer Protocol|
|SNMP||Simple Network Management Protocol|
|SSL||Secure Sockets Layer|
|TACACS||Terminal Access Controller Access Control System|
|TCP/IP||Transmission Control Protocol/Internet Protocol|
|TLS||Transport Layer Security|
|TPM||Trusted Platform Module|
|UAT||User Acceptance Testing|
|UPS||Uninterrupted Power Supply|
|URL||Universal Resource Locator|
|USB||Universal Serial Bus|
|UTP||Unshielded Twisted Pair|
|VLAN||Virtual Local Area Network|
|VoIP||Voice Over IP|
|VPN||Virtual Private Network|
|WAF||Web Application Firewall|
|WAP||Wireless Access Point|
|WEP||Wired Equivalent Privacy|
|WIDS||Wireless Intrusion detection System|
|WIPS||Wireless Intrusion Prevention System|
|WPA||Wireless Protected Access|
|XSRF||Cross-Site request Forgery|
How to permanently delete files from your computer:
Windows XP will end its 12-year successful run on April 8th and Microsoft wants the considerable number of users to shift over to more modern versions of its operating system. For full details regarding Windows XP support cycle, please check my earlier blog article: It’s time to upgrade: Windows XP:
When you delete any file or folder from your computer, it moves to the Windows Recycle Bin. This is easily recoverable. If you empty the Recycle Bin, the data still remain on your hard disk? In many cases, deleted files can be recovered with little effort because most computer operating systems will only delete links to the data so they no longer appear to you, but the actual data remains on the disk. Getting access to the deleted data is as simple as restoring the links.
When you delete files or folders, the data are not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is “deallocated.” After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software.
To permanently erase files and prevent your confidential files from getting into the wrong hands, Microsoft offers a free command line utility – SDelete (Secure Delete) – that overwrites all the free space to prevent data recovery.
You can use SDelete both to securely delete existing files (replacement of delete), as well as to securely erase any file data that exists in the unallocated portions of a disk (including files that you have already deleted or encrypted).
Step-by-Step: Using SDelete:
Download the Microsoft command-line tool SDelete. Here’s how to use this tool.
1. Click StartRun > ... , type cmd and press OK or Enter (Return). (Windows Vista and Windows 7 users can just click Start and type cmd in the Windows Search box.)
2. Navigate to where you have SDelete downloaded. For example, if it’s located at C:\cmdtools, type cd C:\cmdtools, and press Enter.
3. Now type sdelete <path to file or directory>, and press Enter, where <path to file or directory> is a standard Windows path. For example, to delete C:\mysecuredata.txt, you would type sdelete c:\mysecuredata.txt, and press Enter.
4. Once they’re deleted, you will receive confirmation that your files or folders have been permanently deleted, and you’re done!
If you are already using CCleaner, you should know that it contains a Drive Wiper.
Open CCleaner and go to > Tools > Drive Wiper. You can wipe only free space or the entire drive, and you can choose up to 35 passes, meaning data will be overwritten with random strings of binary code 35 times. This very complex overwrite should make it impossible for anyone to restore the data originally saved in this space. When you’re happy with your settings, click > Wipe and wait patiently.
Eraser is a freeware and open source security tool to completely remove data from your hard drive. It can overwrite data several times using randomized patterns of binary code. It essentially is a file shredder.
Eraser is more convenient than CCleaner’s Drive Wiper because it can delete and shred single files, rather than just wiping all free space on a drive, and it is integrated with Windows Explorer (right-click menu). Moreover, Eraser provides you with a host of advanced settings, for example, different file and space erasure methods, the option to replace erased files with other files to allow plausible ‘deniability’, and schedule erasure of files, folders, recycle bin, or unused disk space.
Whenever you want to securely erase your data, follow these steps.
- Navigate to the files or folders that you want to securely erase.
- Right-click on the files and/or folders and an Eraser menu will appear.
- Highlight and click Erase in the Eraser menu.
Active@Kill Disk – Hard Drive Eraser:
Active@ Kill Disk – Hard Drive Eraser is a free utility for securely erasing a hard drive. More importantly, this utility adheres to the United States Department of Defense standards (DoD 5220.22M) for hard disk data removal.
DBAN (Darik’s Boot And Nuke):
DBAN, as it is shortened, is a nice little application that lets you completely erase your data.
Download the ISO for your system and burn it to a disk. Next, pop the disk into your hard drive and boot from it. This may require you to press F12 at the BIOS screen (the first screen you see when your computer boots up) and choose to boot from your CD/DVD drive.
Press Enter to run DBAN in interactive mode.
1. Use up and down arrow keys to highlight the drive to wipe.
2. Press the space bar to select the drive.
3. Press M to select the wiping method.
4. Press F10 to begin the wipe process.
Note: if DBAN is unable to recognize your SATA hard disks, configure your system BIOS to use IDE mode rather than AHCI mode.
Now that you have the right tools for the job, you can feel confident in knowing that your data has actually been removed from your hard disk and will no longer be recovered by anyone (not even by you).