[TechRepublic] REMnux: Reverse-engineering malware

IT Security

TechRepublic Member | December 20, 2011

REMnux: Reverse-engineering malware

"Know thy enemy" is a well-worn phrase. No matter; the saying is germane when it comes to malicious code. Michael Kassner looks at a toolkit that reverse-engineers malware. Read more

Resource of the day

IBM XIV Storage System: 40,000 Mailboxes

Fortunately, you have IBM's XIV storage system to manage your email storage. What's that? You don't? Well, then you ought to check out this white paper to learn more about XIV.


Bitdefender's cloud-based security tools worth investigating for SMBs

Steven Trippe describes Bitdefender's cloud security services and points out issues to consider for SMBs weighing security solutions. Read more

A look into Microsoft Security Essentials 2012

Scott Lowe takes a detailed view into the Microsoft Security Essentials latest build, still in beta, noting some of the changes and performing some basic testing. Read more

Additional TechRepublic resources

 

10 holiday-busting IT crises

We asked TR members to share their memories of holidays that went awry because of a work emergency. Here are 10 such tales, plus one vacation horror story. Read more

Bring Your Own Device: Risks and rewards

With BYOD, there is risk and reward, an ongoing conversation and a lot of running around with your hair on fire to get it to function at scale in the enterprise but it might just be worth it in the end. Read more

Featured multimedia

 

Desktop Wallpaper: Northern lights

The Winter Solstice is approaching, which means winter, which means cold weather and long nights. And for the kid in all of us it brings up memories of the North Pole. Imagine going to work under the colorful aurora borealis (northern lights). View on site



Today's recommended downloads

Live Webcast: The Power Behind Data Mining & Analytics (IBM)

An Improved Architecture for High-Efficiency, High-Density Data Centers (American Power Conversion (APC))

Getting More From Your Network with Storage Enterprise Resource Planning (IBM)

Manage Your Storage (IBM)

Enterprise-Level Deduplication Technology for SMEs (IBM)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Last-minute geeky gifts to avoid

Wally Bahny thinks these geeky gifts are not worth buying because they will lose their luster after a few minutes or one use. See if you agree with his list.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment