Mal Contents

Masciarotte, Oliver
February 2005
Mix;Feb2005, Vol. 29 Issue 3, p80
Focuses on various security measures for computer systems. Application of adware; List of possible spyware; Advantages of dialers in computer systems. INSET: Logging Ban.


Related Articles

  • ZERT to the rescue. Gibson, Stan // eWeek;10/16/2006, Vol. 23 Issue 41, p34 

    The article presents the author's views on Zeroday Emergency Response Team (ZERT), a group of security expert volunteers who create patches for security holes in software products. ZERT's emergence as a player in the security arena augurs well for the computer industry. With the emergence of...

  • Snoop doggy lock.  // Australian Personal Computer;Oct2004, Vol. 24 Issue 10, p142 

    This article presents information about USB key. This is wireless medallion and software combo which locks your computer it you move more than two metres away from it. Come back within range and it unlocks. If you leave the medallion at home you can unlock your PC with a password.

  • Vulnerabilities are everywhere. Roberts, Paul F. // eWeek;11/21/2005, Vol. 22 Issue 46, p28 

    The article informs that according to statistics released by vulnerability scanning company Qualys Inc., two of every three computers are running software that contains a critical security hole. The data, based on more than 32 million vulnerability scans, spans three years. In all, 21 million...

  • Storage security firm times it right. Dix, John // Network World;3/14/2005, Vol. 22 Issue 10, p38 

    This article features Decru Inc.'s security appliance called DataFort for the computer industry in the U.S. DataFort is a combination of storage devices, direct-access, networked-attached or tape, that encrypts everything at wirespeed. This application is being used to protect everything from...

  • Painless patching. Greene, Tim // Network World;9/26/2005, Vol. 22 Issue 38, p25 

    This article reports on the availability of two approaches in installing network security patches. These approaches refer to a software that runs on the servers being protected, and an appliance that sits in front of the servers. Determina Inc. makes the software called LiveShield and Blue Lane...

  • Sybase readies revamped database. Cowley, Stacy // Network World;9/12/2005, Vol. 22 Issue 36, p34 

    This article reports that Sybase Inc. is preparing to release a major new version of its database software, Adaptive Server Enterprise (ASE) 15. The update offers customers greater security and scalability features with significant advances in areas such as encryption and manageability. One key...

  • Pulling the Event Trigger. Minasi, Mark // Windows IT Pro;Dec2004, Vol. 10 Issue 14, p75 

    Provides tips on how to activate event trigger in a computer system. Importance of an event log; Parameters included in eventtrigger.exe which is included in Windows Server 2003 and Windows XP; Syntax; Steps in running Net Send command.

  • Software tackles spyware, virus threats. Messmer, Ellen // Network World;3/28/2005, Vol. 22 Issue 12, p18 

    This article reports that GreenBorder Technologies debuted a software aimed at preventing spyware and virus contamination from the Internet for users of Microsoft Corp.'s Internet Explorer browser and Outlook electronic-mail. The company's first product is GreenBorder Professional Edition,...

  • 10 ways to STOP spyware. Gaskin, James // Network World;3/28/2005, Vol. 22 Issue 12, special section p16 

    This article provides ways to stop spyware such as the following: 1) distinction among spyware, adware, hijackers, and cookies; 2) decision to shift to Firefox or Opera Internet browser; 3) caution not to download anything in the Internet; 4) teaching of users on how to recover from download...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics