• July 11, 2006 11 Jul'06

    Microsoft patches seven July security holes, five critical

    The software giant's monthly batch of fixes includes critical repairs for Internet Explorer and Windows' networking features, plus "important" bulletins for Internet Information Server.  Continue Reading

  • July 11, 2006 11 Jul'06

    Thwarting spam from the inside and the outside

    After discovering that stopping email threats takes more than a layer of spam filtering and two layers of virus protection, one law firm added hosted defense to the mix.  Continue Reading

  • July 11, 2006 11 Jul'06

    Inside MSRC: Debunking Excel exploits

    Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletins, offers some Windows networking best practices and says one alleged Excel exploit isn't what it seems.  Continue Reading

  • July 10, 2006 10 Jul'06

    WEP

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is ...  Continue Reading

  • July 10, 2006 10 Jul'06

    Wired Equivalent Privacy

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is ...  Continue Reading

  • July 10, 2006 10 Jul'06

    Wired Equivalent Privacy (WEP)

    Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is ...  Continue Reading

  • July 10, 2006 10 Jul'06

    Transport Layer Security (TLS)

    Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet.  Continue Reading

  • July 10, 2006 10 Jul'06

    TLS

    Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet.  Continue Reading

  • July 10, 2006 10 Jul'06

    Transport Layer Security

    Transport Layer Security (TLS) is a protocol that ensures privacy between communicating applications and their users on the Internet.  Continue Reading

  • July 10, 2006 10 Jul'06

    brute force cracking

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than ...  Continue Reading

  • July 10, 2006 10 Jul'06

    brute force

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than ...  Continue Reading

  • July 10, 2006 10 Jul'06

    cracking

    Brute force (also known as brute force cracking) is a trial and error method used by application programs to decode encrypted data such as passwords or Data Encryption Standard (DES) keys, through exhaustive effort (using brute force) rather than ...  Continue Reading

  • July 10, 2006 10 Jul'06

    Crash Course: Spyware

    In general, spyware is any technology that aids in gathering information about a person or organization without their knowledge.  Continue Reading

  • July 10, 2006 10 Jul'06

    virus

    In computers, a virus is a program or programming code that replicates by being copied or initiating its copying to another program, computer boot sector or document.  Continue Reading

  • July 10, 2006 10 Jul'06

    Five freeware tools for mitigating network vulnerabilities

    From Nmap to Snort, there are a variety of viable freeware tools available for information security professionals. In this tip, Michael Cobb reviews five freeware tools and explains why he believes they are the best tools in their space.  Continue Reading

  • July 10, 2006 10 Jul'06

    Sample Chief Information Security Officer resume

     Continue Reading

  • July 10, 2006 10 Jul'06

    Security Bytes: Data breach affects 100,000 military personnel

    Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in security breaches.  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close