Scamware to watch out for, developer ticketing systems, Google Chrome extensions for better browsing

Five Apps

TechRepublic Member | February 07, 2012

Five pieces of scamware to watch out for

From fake antivirus apps to uninvited toolbars, scamware can bog down your users' PCs -- and sometimes do a whole lot worse. Read more

Resource of the day

Explore Benefits of Cisco Unified Fabric

Take a look at this video to see how Cisco's data centers are bucking the trends, and creating new ones. For a more agile, cost-effective approach to storing data, tune in today.


Hottest new lists

 

Five ticketing systems for developers

The right app can make a big difference when it comes to tracking bugs, integrating with other systems, and working through development tasks. Read more

Five LibreOffice extensions to help you catch grammar problems

If you do a lot of writing using LibreOffice, these handy extensions will help you spot mistakes and polish your work. Read more

Five timesaving extensions for Google Chrome

It's easy to get lost in the vast herds of Chrome extensions, so we rounded up five good candidates that will streamline your browsing experience. Read more


Additional TechRepublic resources

 

10 Things Call for Feedback: Who is the best person you ever worked with?

Have you ever worked with someone who had a major positive impact on your life, your job, and/or your outlook? Share your story with the rest of us. Read more

Why are websites getting your mobile-phone number?

Are mobile-service providers leaking data into traffic destined for web servers? That's what a research analyst set out to prove. Read more

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against. Read more

10 threats to The Golden Age of the Internet

Have we been taking the Internet for granted? See why we might soon find ourselves reminiscing about the days of unfettered use and free access. Read more


Featured multimedia

 

Top apps for removing crapware

Get rid of that unwelcome crapware by running one of these safe, easy-to-use tools. View on site


Featured Webcast

Live Webcast: Top Considerations for Effective Managed Security for 2012 and Beyond

Register for this webcast, Top Considerations for Effective Managed Security for 2012 and Beyond, to learn more about what you can do to keep your network protected for years to come.


Today's recommended downloads

The Importance of Defragmentation in Virtualized Environments (Diskeeper)

Improved Cooling Strategies for IT Wiring Closets (APC by Schneider Electric)

Consolidate Traffic & Boost Performance (Cisco Systems, Inc)

Netshelter CX Enclosure - Product Demonstration (APC by Schneider Electric)

A Year of Information in One Easy Download (dynaTrace software)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

The three types of online attackers

Patrick Lambert describes the three main groups of attackers that security specialists are guarding against.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things





Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is ceasar@cesabarre.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment