TITLE

Mal Contents

AUTHOR(S)
Masciarotte, Oliver
PUB. DATE
February 2005
SOURCE
Mix;Feb2005, Vol. 29 Issue 3, p80
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on various security measures for computer systems. Application of adware; List of possible spyware; Advantages of dialers in computer systems. INSET: Logging Ban.
ACCESSION #
15871543

 

Related Articles

  • Snoop doggy lock.  // Australian Personal Computer;Oct2004, Vol. 24 Issue 10, p142 

    This article presents information about USB key. This is wireless medallion and software combo which locks your computer it you move more than two metres away from it. Come back within range and it unlocks. If you leave the medallion at home you can unlock your PC with a password.

  • Vulnerabilities are everywhere. Roberts, Paul F. // eWeek;11/21/2005, Vol. 22 Issue 46, p28 

    The article informs that according to statistics released by vulnerability scanning company Qualys Inc., two of every three computers are running software that contains a critical security hole. The data, based on more than 32 million vulnerability scans, spans three years. In all, 21 million...

  • Storage security firm times it right. Dix, John // Network World;3/14/2005, Vol. 22 Issue 10, p38 

    This article features Decru Inc.'s security appliance called DataFort for the computer industry in the U.S. DataFort is a combination of storage devices, direct-access, networked-attached or tape, that encrypts everything at wirespeed. This application is being used to protect everything from...

  • ZERT to the rescue. Gibson, Stan // eWeek;10/16/2006, Vol. 23 Issue 41, p34 

    The article presents the author's views on Zeroday Emergency Response Team (ZERT), a group of security expert volunteers who create patches for security holes in software products. ZERT's emergence as a player in the security arena augurs well for the computer industry. With the emergence of...

  • Painless patching. Greene, Tim // Network World;9/26/2005, Vol. 22 Issue 38, p25 

    This article reports on the availability of two approaches in installing network security patches. These approaches refer to a software that runs on the servers being protected, and an appliance that sits in front of the servers. Determina Inc. makes the software called LiveShield and Blue Lane...

  • Pulling the Event Trigger. Minasi, Mark // Windows IT Pro;Dec2004, Vol. 10 Issue 14, p75 

    Provides tips on how to activate event trigger in a computer system. Importance of an event log; Parameters included in eventtrigger.exe which is included in Windows Server 2003 and Windows XP; Syntax; Steps in running Net Send command.

  • McAfee, Tech Assist top anti-spyware test. Nance, Barry // Network World;9/12/2005, Vol. 22 Issue 36, p52 

    This article presents the results of the Clear Choice Test for anti-spyware tools by the journal "Network World." Spyware can kill the business quicker than spam or viruses. Spam eats bandwidth and productivity. Viruses delete files, throw egotistical messages on the screen, and use the address...

  • Software tackles spyware, virus threats. Messmer, Ellen // Network World;3/28/2005, Vol. 22 Issue 12, p18 

    This article reports that GreenBorder Technologies debuted a software aimed at preventing spyware and virus contamination from the Internet for users of Microsoft Corp.'s Internet Explorer browser and Outlook electronic-mail. The company's first product is GreenBorder Professional Edition,...

  • 10 ways to STOP spyware. Gaskin, James // Network World;3/28/2005, Vol. 22 Issue 12, special section p16 

    This article provides ways to stop spyware such as the following: 1) distinction among spyware, adware, hijackers, and cookies; 2) decision to shift to Firefox or Opera Internet browser; 3) caution not to download anything in the Internet; 4) teaching of users on how to recover from download...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics