• October 31, 2008 31 Oct'08

    Hoff and Citrix’s Crosby to go all sumo at RSA

    Security vendors and doomsayers have been using the specter of virtualized rootkits, undetectable malware worming its way into virtualized environments, and all manner of other bogeymen to warn ...  Continue Reading

  • October 30, 2008 30 Oct'08

    hybrid virus/worm

    A hybrid virus/worm is malicious code that combines characteristics of both those types of malware, typically featuring the virus' ability to alter program code with the worm's ability to reside in live memory and to propagate without any action on ...  Continue Reading

  • October 30, 2008 30 Oct'08

    network intrusion detection systems

    Host intrusion detection systems (HIDS) and network intrusion detection systems (NIDS) are methods of security management for computers and networks... (Continued)  Continue Reading

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close