• všechny e-ziny od 9/1999
  • celou databázi NEWS
  • soutěže 2000-2011
  • další články a BONUSY

Security - News


Crypto - News | Security - News

12 / 2006
Vybrali pro vás: TR - Tomáš Rosa, JP - Jaroslav Pinkava, PV - Pavel Vondruška, VK - Vlastimil Klíma

Tech Republic - top download of 2006

  • 1. 10 things you should know about fighting spyware in Windows XP Spyware can wreak havoc on your users' machines and pose a serious threat to your network security. Whether you're dealing with pop-up ads, hijacked browser pages, redirected Web searches, or the theft of personal information, it's essential to use all the tools and tactics available to combat the problem. Windows expert Greg Shultz lists 10 of the most effective ways to fight spyware in Windows XP.
  • 2. Top 10 valuable (but underused) Microsoft security technologies For the past few years, security has been a top priority for Microsoft, as evidenced by various tools included with Windows and available as free downloads. IT pro Tom Shinder identifies 10 of the most underappreciated Microsoft security technologies.
  • 3. Hacking Windows XP and Windows Server 2003 Learn how to recognize and fight common Windows XP and Windows Server 2003 hacking techniques. This chapter from McGraw-Hill's Hacking Exposed, Fifth Edition provides detailed insight on how to fight common Windows XP and Windows Server 2003 hacking methods.
  • 4. 10 ways to avoid being the victim of identity theft Identity theft is on the increase, to the tune of 10 million victims in the United States and $50 billion in costs. Luckily, you can reduce the risk of becoming an ID theft victim (or minimize the damage if you do become a target) by following a few sensible practices. IT security expert Deb Shinder put together this list of recommendations to help users avoid falling prey to identity thieves.
  • 5. Firewalls demystified: Protecting your small office or home network Increasing use of always-on broadband Internet connections in small offices and homes presents a unique challenge--how to protect computer systems that often don't have the oversight of IT departments. This chapter from Firewall Fundamentals explains the benefits, limitations, and configuration options of some commercially available solutions.
Zdroj: http://ct.techrepublic.com.com/clicks?t=23717843-8a399d6be44f77b16669c3e315c9c3cd-bf&s=5&fs=0
Autor: JP

<<- novější - R?zné techniky pro hledání bezpe?nostních chyb SW
draft IETF pkix - Certificate and Certificate Revocation List (CRL) Profile - starší ->>
Design: Webdesign