Best viewed in Firefox and Flock browsers
Three Ways to Get FREE Technical Support here.
1. Search for existing articles ans solutions using the search box.
2. Email your questions to FreeHelp@cesabarre.com
3. Post your questions right here for everyone to see and help you.

[TechRepublic] ExploitHub: Radical way to check for vulnerabilities

Trouble viewing this mail? Read it online | Manage my newsletters | Unsubscribe

TechRepublic IT Security

TechRepublic Member | September 28, 2010


ExploitHub: NSS Labs' radical way to check for vulnerabilities

Wouldn't using actual exploit code be the best way to determine if your systems are vulnerable? NSS Labs thinks so. Learn how they are making that possible. Read more

Resource of the day

How Google Tackles Its Own IT Security

Join members of Google's internal security team as they discuss the biggest threats against web-based apps and what you can do to guard against them.


Turn off modeline support in Vim

For those who need it, Vim's modeline support can be very useful. For the rest of us, it is nothing but a possible hole in our security. Read more

Should BCC be the default email address field?

A constant source of annoyance for many technically-inclined computer users is mass mailings from more nontechnical users that expose every recipient's email address to everyone else. Perhaps a simple UI change is in order. Read more

Additional TechRepublic resources

 

Five tips for avoiding removable media malware

With the growth of widespread network-delivered malware infections, we tend to forget that sometimes the old methods are still effective. Find out what you can do to protect yourself from the hands-on threat of removable media malware. Read more

Making the move to Data Protection Manager 2010

Westminster College's backup infrastructure is in need of an overhaul. Scott Lowe explains why its IT department is planning to move backup to Data Protection Manager 2010 and what that entails. Read more

10 tips for troubleshooting PC system slowdowns

When PC performance slows to a crawl, a systematic troubleshooting plan will help you zero in on the cause. Deb Shinder runs through likely culprits and describes steps you can take to improve system performance. Read more

Change local username and password via Group Policy

For Windows administrators, a common practice is to have a local username and password for administration when cached credentials are not available. Learn how to change an existing configuration. Read more

Review: Secunia Personal Software Inspector

For anyone who has had to (or wanted to) keep up with all application updates on a machine, from a single point of contact, Secunia PSI might be just the tool. Read more

Camera phone challenge: Sunrise / sunset

You have from now until Friday, October 8, 2010 at 5:00 PM EDT to submit camera phone photos of the sunrise / sunset. The editorial staff will select their three favorite photos from all the entries, and the TechRepublic members who submitted those photos will receive some free swag! Read more

Featured multimedia

 

Tour Norton Internet Security 2011 (slideshow)

Symantec's been making a concerted effort for three years running to turn around their Norton products. Norton Internet Security 2011 is not only their best effort to date, it's one of the strongest security suites this year, period. View on site


Gallery perennial favorites

Computer bloopers and blunders from the technically clueless

Photo memories of 18 first computers

Wild computing devices from the late 1800s and early 1900s

Amazing LEGO creations from Brickworld 2010

NASA spacecraft and aircraft in flight


Today's recommended downloads

How Google Tackles Its Own IT Security (Google)

How to Save Cloud Computing Users from Evil-Doers (Akamai Technologies)

Distributing Security and Optimization in the Application Delivery 2.0 Era (Akamai Technologies)

Best Practices for Deploying Collaborative BI (Tableau Software)

Have You Supersized Your Data Center? Avoid the Pitfalls of Oversizing (American Power Conversion (APC))


Steampunk: A way of life for some designers

For many, steampunk is a fun hobby. But for designers Jake von Slatt and Richard Nagy, steampunk is a way of life. See photos of a steampunk antiquated PC, a steampunk keyboard, and more.




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is laoanganon@gmail.com
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

 

Copyright 2010 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment