Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] Five tips for improving Linux security

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

TechRepublic TR Dojo

TechRepublic Member | November 09, 2010


Video: Five tips for improving Linux security

Bill Detwiler shares five tips for improving Linux security, such as not logging in as root and using keyring. Read more

Resource of the day

Use TCO to Build a Business Case for Unified Communications

Discover how to provide quantifiable bottom-line proof to support a unified communications purchase.


Additional TechRepublic resources

 

Server Room Nightmare Challenge 2010 winners announced

Bill Detwiler asked TR members to submit their photos of nightmare server rooms they've encountered. TechRepublic editors picked our top three, but it was hard! Read more

Video: Five mistakes to avoid when supporting smartphones and mobile devices

Bill Detwiler outlines five mistakes that IT departments should avoid when supporting smartphones and mobile devices. Read more

Pop Quiz: Command-line network troubleshooting tools

Do you know the difference between ping and traceroute? Take this short quiz and test your knowledge of command-line networking utilities. Read more

Hacking made easy: Protecting yourself from the Firesheep extension

Derek Schauland took the Firesheep extension for Firefox out for a spin, and discovered how easy it makes stealing credentials on open wireless networks. Here is his take on how to protect yourself. Read more

Poll: Will you shop at a Microsoft Store?

The TechRepublic Windows Blog member poll question: If one were located in your local mall, would you shop at a Microsoft Store? Read more

Sony PSP Go Teardown

Real-world server room nightmares

Apple MacBook Air Teardown (13-inch 2010)

Zombie culture on display at zomBcon 2010

 


Featured multimedia

 

Entourage Pocket eDGe (photos)

Take a closer looks at the Pocket eDGe from Entourage--a dual-screen tablet with an e-ink display and an Android-powered color LCD. View on site

Sony NSX-GT1 series -- Google TV (photos)

Easily the most capable Internet-connected TV ever made, Sony's NSX-GT1 series calls for a tech-savvy buyer who can live with Google TV's growing pains, a touchy remote and so-so picture quality. View on site

Samsung Continuum hands-on (photos)

CNET goes hands-on with Verizon's latest Android smartphone, the dual-display Samsung Continuum. View on site

LG GS170 (photos)

The LG GS170 doesn't have a lot of bells and whistles, but it works as a good and affordable entry-level phone for T-Mobile. View on site


Featured Webcast

Business Security in Windows

Business networks face a wide variety of security threats which can be prevented, or at least managed. Listen to this presentation discussing these threats and their impact, and how to best manage them.



IT Help Desk Survival Guide, 3rd Ed.

 
Have extra budget to spend? Then order TechRepublic's IT Help Desk Survival Guide, Third Edition provides tools and tips to help you better manage help desk services, improve end-user support, troubleshoot hardware issues, identify quick fixes to Windows problems, and help users make the most of Microsoft Office. Order the download today! IT Help Desk Survival Guide, Third Edition

Today's recommended downloads

The Path to Rapid Integration Lies in the Cloud (IBM)

Businesses Thrive with Google Apps (Google)

Save Money and Increase Collaboration with Google Apps (Google)

Geek Out on the Best Practices of a Google Apps Deployment (Google)

Technology Report: Energy-Efficient Cooling for Data Centers (American Power Conversion (APC))


End-user bloopers and IT chaos

 
Computer bloopers and blunders from the technically clueless

Computer bloopers and blunders from the technically clueless

What not to do in a server room

What not to do in a server room

Convicted of endangering their computers?

Convicted of endangering their computers?

Dirty computers: Revenge of the dust bunnies

Dirty computers: Revenge of the dust bunnies

 

Camera phone challenge: Funny signs

Submit your camera phone photos of funny and/or interesting signs by Nov. 19th. If your entry is selected as one of our three favorite photos, you'll receive TechRepublic swag. Get more details.



TechRepublic newsletters

 

Get IT advice and techniques, mobile news, Mac tips, and product reviews in these TechRepublic newsletters. Automatically sign up today!

Five Tips

10 Things

Smartphones

Macs in Business

Product Spotlight



Server room galleries

Real-world server room nightmares

What not to do in a server room

Server room cabling nightmare

Server room makeover at Westminster College



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

 

Copyright 2010 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment