Topics Archive

Topics Archive News

View All News

Topics Archive Get Started

Bring yourself up to speed with our introductory content

  • Trojan horse

    A Trojan horse is a program that appears harmless but is, in fact, malicious. Attackers have long used Trojan horses as a way to trick end users into installing malware. Continue Reading

  • honeypot (honey pot)

    A honeypot is a computer system that is set up to act as a decoy to lure cyberattacks and to detect, deflect, or study attempts to gain unauthorized access to information systems. Continue Reading

  • Secure Shell (SSH)

    Secure Shell (SSH) is a network protocol that secures data communications between computers on an insecure network using strong authentication and encryption. SSH also refers to the utility suite that implements the protocol, and which can be used ... Continue Reading

View All Get Started

Evaluate Topics Archive Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Topics Archive

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Topics Archive Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close