[TechRepublic] Captured images of physical keys can be used to make copies

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | February 22, 2011

Captured images of your physical keys can be used to make copies

It seems like every time we turn around, there is another threat to our privacy and security that needs to be addressed. This time, it's your physical -- not cryptographic -- keys. Read more

Resource of the day

New Storage Options to Tame the Information Explosion

Tame the information explosion with innovative technologies that improve storage efficiency, reduce cost, and minimize risk. Plus, get the news about a new storage offering that provides scalability, manageability, and enterprise-class capabilities.


Students of IT security: Career advice from the masters

Michael Kassner asks two security experts what it takes to become an IT security pro. Here are their opinions on education, certs, hands-on work, and all the preparation needed to become an expert... Read more

Why not use OpenPGP for Web authentication?

TLS is the default solution for strong encryption on the Web, but perhaps it should not be. Why has no alternative arisen to challenge it, despite all of the problems of TLS encryption? Read more

Additional TechRepublic resources

 

Nagios monitoring with NRPE allows better tracking of remote systems

The NRPE plugin allows you to track exactly what is going on with remote servers, both from an external view and an internal view, including disk usage, CPU spiking, and memory issues. Read more

DIY: Free tools for removing malicious software

Fighting the malware battle really hurts when you're spending a good deal of your IT budget (if you even have an IT budget) on software to protect machines from attacks. Here's how to do it for free. Read more

Seven reasons network management needs IBM's Watson

Mark Underwood takes a look at IBM's Watson project and what it means in more practical terms of applying AI to the future of network management. Read more

Security information management and event logs: What to consider when choosing a solution

Colin Smith explains the differences between Security Information and Event Management systems, log managers, and Microsoft's Audit Collection Services for managing, collecting, and storing event logs for compliance and security purposes. Read more

Featured multimedia

 

Norton CyberCrime Index (images)

Norton's CyberCrime Index provides a barometric-style reading of the threatscape, in real time. View on site


Photos through a microscope

Olympus BioScapes: Art that lives under the microscope

Photomicrography winning images over the years

Nikon Small World winning photographs under the microscope for 2010

Nikon Small World's categories of photos through the microscope


Today's recommended downloads

Free Trial Download: up.time Systems Management Software (Uptime Software)

Implement these Best Practices for Cloud Security (IBM)

Efficient Hyper-V Management and Performance (TechRepublic)

How IBM Can Help Your Business Be More Resilient (IBM)

New Storage Options to Tame the Information Explosion (IBM)


Screenshots: Mozilla starts on Firefox 5 designs

Firefox 4 hasn't even been fully baked and served up yet, but that's not stopping Mozilla from pushing ahead with plans for Firefox 5.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment