[TechRepublic] Privacy covenant is an illusion: Regaining control

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

IT Security

TechRepublic Member | April 19, 2011

The privacy covenant is an illusion: How to regain control

Agreement to share information in exchange for protection or services has become an irrelevant formality. Wouldn't it be nice if we could claim enough of a position of strength to make our choice to give or withhold consent a meaningful decision? Read more

Resource of the day

Gain Control of your Infrastructure

Discover how today's infrastructure management software packages integrate with virtualization platforms, enterprise management systems, and even building management systems for holistic management of the entire data center ecosystem.


Smartphone apps: They may be listening

Is your smartphone listening? It might. And, you may not even know it. Read more

SSL/TLS encryption and the vacant lot scam: Too big to fail

Find out what kind of scam masquerades as security on the Web, how the scammers are "too big to fail", and why we should make the switch to an alternate system of certificate validation. Read more

Guns, babes, and rootkits: A Windows guru writes a thriller

Microsoft's Mark Russinovich released his first novel, a thriller based on a zero-day attack. Mark Underwood reviews the novel and the security tech featured in it. Read more

Additional TechRepublic resources

 

Authenticate users on the network by configuring ACS 5.2 for a Cisco switch

Brandon Carroll walks you through the basic steps of configuring ACS 5.2 (Access Control System) for 802.1x authentication using EAP-MD5 to help you manage devices that can connect to your corporate network. Read more

Skywatchers spot the mysterious X-37B orbital test vehicle

Satellite watchers report seeing the the X-37B space plane, an unmanned vehicle operated by the U.S. Air Force. The spacecraft's mission is a secret. Read more

SEO specialists, meet Panda, Google's newest search bear

Has your website been swatted by the big paw of Google's new Panda search algorithm? Mark Underwood tells SEO specialists to pay heed to Google's "suggestions" or pay the price. Read more

Featured multimedia

 

Can you spot a scam? (screenshots)

If an attacker knows your name, the companies you deal with and your email, then it can craft some convincing emails that have a much better chance of fooling you. View on site


Five of the best Android smartphones

HTC ThunderBolt

Motorola Atrix

Samsung Galaxy S 4G

HTC Inspire

Google Nexus S

Leaderboard 2011: The 10 best Android smartphones


Today's recommended downloads

Discover How Technology Is Shifting the Focus in Healthcare (Hewlett-Packard (HP))

Tech Report: Guidelines for Specifying Data Center Criticality/Tier Levels (American Power Conversion (APC))

The Essential Guide to Legacy-Free DR (Veeam Software)

Gain Control of your Infrastructure (American Power Conversion (APC))

Dispelling the Vapor Around Cloud Computing (IBM)


Spotlight on the TechRepublic iPhone app

Scott Lowe gives the TechRepublic iPhone app high marks, although he does list two areas that could use improvement. Read his review of the TechRepublic iPhone app.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment