Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] Lessons to learn from the Twitter worm

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

TechRepublic IT Security

TechRepublic Member | October 05, 2010


Five security lessons to learn from the Twitter worm

A scripting worm struck twitter.com in September. Find out how it revealed an embarrassing error, and learn a few security lessons from Twitter's mistake. Read more

Resource of the day

On-Demand Videocast: Delivering a WOW! Experience to Customers

Today, it's not enough to compete on just price and product. Learn how to deliver a great customer experience that keeps them coming back for more.


How to escape SSH sessions without ending them

A simple task on the local machine in the middle of using SSH to work on a remote machine does not have to mean ending the SSH session. Read more

WinPatrol Cloud Edition leverages collective intelligence

MVP Bill Pytlovany created his security utility called WinPatrol 11 years ago. It's time to take another look at the app, because the Cloud Edition makes it even better. Read more

Lock your screen while away from the computer

Locking your laptop or workstation while away from it is good security sense. Learn a number of different ways to do so, both on MS Windows and common open source Unix-like operating systems. Read more

Additional TechRepublic resources

 

Five tips to ensure safe online shopping

Online shopping is convenient. Unfortunately, that convenience can put your personal and financial information at risk. Michael Kassner shares some lessons he had to learn the hard way. Read more

Manage client server OS patching with these best practices

Follow these best practices to ensure the server OS patch process runs smoothly and doesn't introduce new issues and possibly sour the client relationship. Read more

Five tips for moving disaster recovery to the cloud

Companies are beginning to entrust their data to third-party cloud computing services -- but that strategy comes with certain risks. Here's an overview of some of the most critical issues to keep in mind. Read more

Programming news: Rubinius 1.1, Eclipse Helios SR1, critical ASP.NET patch

Read about using jQuery UI on the Microsoft Content Delivery Network, Titanium+Geo, the OpenOffice fork, using IronRuby on Windows Phone 7, and more. Read more

Hal 9000 highlights TR Questions of the Week - October 4, 2010

The questions highlighted in this Questions of the Week post address issues with HAN technology, Windows 7 XP Mode, remote desktop, groups policies, using hosted QuickBooks solutions, and much more. Read more

Featured multimedia

 

10 firewall tools to meet your budget

Jack Wallen briefly evaluates the pros and cons of 10 firewall tools (four of them free) that might fit your needs. View on site

AVG Anti-Virus Free: faster in 2011 (slideshow)

AVG Anti-Virus Free 2011 breathes new life into one of the most popular security programs around with a shorter install, better usability, and faster scans. Tour this year's AVG Free update in this slideshow. View on site


Featured Webcast

SAP Business Communications Management for Utilities

Learn how utilities can improve customer service using SAP Business Communications Management. The software provides a flexible, multichannel, all-IP business communications platform that supports activities from contact centers to field operations.



Today's recommended downloads

Free White Paper: Achieving Efficient Governance, Risk and Compliance (GRC) (Epicor Software)

3 Critical Security Products for the Price of Renewing Antivirus: Free Trial (Shavlik Technologies)

On-Demand Videocast: Delivering a WOW! Experience to Customers (Oracle)

Virtual Client Solutions for Success in a Tricky Economy (Dell)

Get Your Sales Team On Board with CRM (Oracle)


Five tips for meeting the eDiscovery challenge

The time to develop your data archiving strategy is not the day you get hit with an eDiscovery request. Here are a few pointers to help you implement a system that will keep you in compliance.




Mobile app galleries

25 must-have Android apps, according to Jason Hiner

Must-have iPhone apps, according to Michael Kassner

25 must-have iPhone apps, according to Jason Hiner

Must-have Windows Mobile apps, according to Deb Shinder


Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

 

Copyright 2010 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment