Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] How fuzzy hashing fights malware

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | April 05, 2011

Fuzzy hashing helps researchers spot morphing malware

Anti-malware applications are dependent on malicious software remaining the same, code-wise. So the bad guys just keep changing it. Michael Kassner looks at a possible defense: fuzzy hashing. Read more

Resource of the day

Social Networking and Security Risks

Social networking tools can put your information systems and personal data at risk. Take a look at the risks and learn solutions that can protect you, your personal information, and your company data.


Encrypt calls on your Android device with RedPhone

Whisper Systems offers call encryption on Android with RedPhone. Chad Perrin describes how it works and where the potential security questions exist. Read more

Additional TechRepublic resources

 

20 things IT must do before, during and after a disaster

A panel of IT professionals outlines 20 things every IT department should do to prepare for, survive and recover from a disaster. Read more

Three modes of data deduplication: How do you decide?

All deduplication approaches are not created equal! IT maharajah Rick Vanover provides a rundown of the major approaches to data deduplication. Read more

10 best practices for Windows security

Security risks continue to grow for organizations both large and small. Brien Posey offers 10 suggestions for making sure your networks are as well protected as possible. Read more

Featured multimedia

 

A Day at the Hacker Dojo (photos)

Road Trip at Home: Hacker spaces are all the rage. In Silicon Valley, the Hacker Dojo has become one of the hottest. View on site


Net admin galleries

10 Sysinternals tools you shouldn't be without

10 more Sysinternals tools to simplify routine Windows admin tasks

12 of the most recommended network monitoring tools

Network diagrams highly-rated by IT pros


Today's recommended downloads

Why Customers Love VIPRE Business (GFI Software)

Protecting Against the New Wave of Malware (GFI Software)

Social Networking and Security Risks (GFI Software)

Installing Messaging Security Software on Your Exchange Server (GFI Software)

Free Trial Download: up.time Systems Management Software (Uptime Software)


Leaderboard 2011: The 10 best Android smartphones

Hot, new Android devices hit the market almost every week. To help you sort through them all, here's our list of the 10 best Android smartphones, especially with business users in mind.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment