[TechRepublic] Securely erase files in Mac OS X

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

Macs in Business

TechRepublic Member | June 02, 2011

Securely erase files in Mac OS X

Erik Eckel covers the options for those who need to securely erase files from a Mac that contain sensitive or confidential information. Here are the built-in options as well as some third-party solutions. Read more

Resource of the day

KPMG, HP simplify HP records management - A Case Study

With program management assistance from KPMG, HP establishes a foundation to automate its records management using HP TRIM software. Download case study here


Open jobs for iPhone developers

Smartphone app development is one of the hottest career paths going. Here are some iPhone development positions available across the U.S. Read more

Real-life computer crimes investigation: It's not like on TV

If the fancy tech on TV crime shows makes you chuckle, keep in mind that there are many other ways real cases differ from the TV versions. Deb Shinder offers tips for working with law enforcement if you're involved in a computer crime investigation. Read more

Form validation: Create a simple web form with Dreamweaver

Ryan Boudreaux shares a step-by-step tutorial on how to create a simple web form with validation rules with Dreamweaver (basic steps apply using other tools). Read more

Additional TechRepublic resources

 

Intego Virus Barrier aims to add extra protection for Mac users

With renewed talk of malware aimed at Macs, Derek Schauland takes a look at an antivirus solution for those who think they or their users need extra protection from malware and other threats. Read more

Monitor Mac OS X processes like a pro

Erik Eckel goes over the basics of using Mac's Activity Monitor and the command line to monitor processes on Mac OS X. Read more

Apps for file sharing, backups, gaming, and more

For his May 2011 mobile apps roundup, Scott Lowe features cloudsyncr, ShareFile Mobile, AD HelpDesk, MyBackup Pro, and Atari's Greatest Hits. Read more


Featured multimedia

 

Gallery: OtterBox Defender for iPad 2

The new OtterBox Defender is the ne plus ultra of hard case solutions for protecting your iPad. View on site

Apple stores: 10 years of genius (photos)

Many laughed when Apple opened its first retail store 10 years ago. Nobody is laughing now. View on site


Must-read resume tips

Resume tips for experienced IT pros

Lead with your skill set

List accomplishments not duties

Use punctuation to your advantage

Never underestimate the power of a resume typo


Today's recommended downloads

How HP and Fortify helped FICO Implement a Secure Development Lifecycle

Change Management in ERM

Prepare an ERM classification scheme

Key Steps to Proper Planning, Execution and Analysis of Performance Testing Methodology

Select the right ERM system


Real-life computer crimes investigation: It's not like on TV

If the fancy tech on TV crime shows makes you chuckle, keep in mind that there are many other ways real cases differ from the TV versions. Deb Shinder offers tips for working with law enforcement if you?re involved in a computer crime investigation.



TechRepublic newsletters

 

Get net admin tips, tech tutorials and news, and off-topic posts in these TechRepublic newsletters. Automatically sign up today!

Network Administrator

Five Tips

Tech Sanity Check

Geekend



Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment