TITLE

Mal Contents

AUTHOR(S)
Masciarotte, Oliver
PUB. DATE
February 2005
SOURCE
Mix;Feb2005, Vol. 29 Issue 3, p80
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
Focuses on various security measures for computer systems. Application of adware; List of possible spyware; Advantages of dialers in computer systems. INSET: Logging Ban.
ACCESSION #
15871543

 

Related Articles

  • Snoop doggy lock.  // Australian Personal Computer;Oct2004, Vol. 24 Issue 10, p142 

    This article presents information about USB key. This is wireless medallion and software combo which locks your computer it you move more than two metres away from it. Come back within range and it unlocks. If you leave the medallion at home you can unlock your PC with a password.

  • Vulnerabilities are everywhere. Roberts, Paul F. // eWeek;11/21/2005, Vol. 22 Issue 46, p28 

    The article informs that according to statistics released by vulnerability scanning company Qualys Inc., two of every three computers are running software that contains a critical security hole. The data, based on more than 32 million vulnerability scans, spans three years. In all, 21 million...

  • Storage security firm times it right. Dix, John // Network World;3/14/2005, Vol. 22 Issue 10, p38 

    This article features Decru Inc.'s security appliance called DataFort for the computer industry in the U.S. DataFort is a combination of storage devices, direct-access, networked-attached or tape, that encrypts everything at wirespeed. This application is being used to protect everything from...

  • ZERT to the rescue. Gibson, Stan // eWeek;10/16/2006, Vol. 23 Issue 41, p34 

    The article presents the author's views on Zeroday Emergency Response Team (ZERT), a group of security expert volunteers who create patches for security holes in software products. ZERT's emergence as a player in the security arena augurs well for the computer industry. With the emergence of...

  • Painless patching. Greene, Tim // Network World;9/26/2005, Vol. 22 Issue 38, p25 

    This article reports on the availability of two approaches in installing network security patches. These approaches refer to a software that runs on the servers being protected, and an appliance that sits in front of the servers. Determina Inc. makes the software called LiveShield and Blue Lane...

  • Pulling the Event Trigger. Minasi, Mark // Windows IT Pro;Dec2004, Vol. 10 Issue 14, p75 

    Provides tips on how to activate event trigger in a computer system. Importance of an event log; Parameters included in eventtrigger.exe which is included in Windows Server 2003 and Windows XP; Syntax; Steps in running Net Send command.

  • Software tackles spyware, virus threats. Messmer, Ellen // Network World;3/28/2005, Vol. 22 Issue 12, p18 

    This article reports that GreenBorder Technologies debuted a software aimed at preventing spyware and virus contamination from the Internet for users of Microsoft Corp.'s Internet Explorer browser and Outlook electronic-mail. The company's first product is GreenBorder Professional Edition,...

  • To protect and preserve. Baltazar, Henry // eWeek;4/24/2006, Vol. 23 Issue 17, p37 

    The article reports on how content-addressed storage (CAS) systems can help information technology managers bring their organizations into compliance with regulatory mandates. CAS is an intelligent repository used to store and preserve compliance-sensitive documents such as medical records,...

  • 10 ways to STOP spyware. Gaskin, James // Network World;3/28/2005, Vol. 22 Issue 12, special section p16 

    This article provides ways to stop spyware such as the following: 1) distinction among spyware, adware, hijackers, and cookies; 2) decision to shift to Firefox or Opera Internet browser; 3) caution not to download anything in the Internet; 4) teaching of users on how to recover from download...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics