Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured videos

Articles about Security

Network security policy

Network security policy

This policy will help you create security guidelines for devices that transport and store data. You can use it as-is or customize it to fit the needs of your organization and employees. From the policy:...

from Tech Pro Research

Microsoft Private Folder 1.0 screenshots

Microsoft Private Folder 1.0 screenshots

Microsoft's Private Folder 1.0 lets users store files in an encrypted, password-protected folder. This gallery's 30-plus images show the installation process, Private Folder in action, and what happens with you uninstall the application.You can download Private Folder 1.0 from Microsoft's Web site.Read my blog for an explanation of why I believe Private Folder 1.0 could mean headaches for both IT pros and end-users.Submitted by Bill Detwiler

August 28, 2006 by in Security

Photos: CA’s eTrust ISS covers Internet threat spectrum

Photos: CA’s eTrust ISS covers Internet threat spectrum

Computer Associates’ Internet Security Suite (ISS) collects four Internet security applications into a single, affordable suite. For approximately $40, small businesses receive the benefit of antivirus, antispam, antispyware and firewall programs.Boasting simple setup and effective protection, there’s a price to be paid when loading CA’s ISS. Plan on spending some time configuring its firewall application, and, as with many other Internet protection programs, expect slightly slower Web response times as the software works to protect systems from unwanted and potentially malicious e-mail and other infected programs.

August 17, 2006 by in Networking

Most Popular