Security tutorial MacInstruct has a new tutorial on File Security. Its emphasis is on how to use PGP. UpdateAgent and URL Access 2.3 conflict Mike Fleischner found that UpdateAgent failed to work when ...
Protecting the personal information of customers, clients, and employees is good business. The Federal Trade Commission has a new online tutorial to alert businesses and other organizations to ...
As SIP continues to seep into the mainstream, more attention is being paid to security issues, especially in public IP networks/the Internet. At VoiceCon Orlando in March, we're bringing back Cullen ...
IE-SPYAD is a registry import file that will add a list of known sites and domains that are associated with spyware, hijackers, advertisers and other malicious programs that can affect the privacy and ...
Cisco launched this feature to the market last month at Interop. In a nutshell, it provides IOS routers with intelligent, identity aware, traffic redirection to the Cisco ScanSafe web security cloud ...
Microsoft's much-publicized security push has cost real money--$100 million of person-hours went into the two-month hiatus in development of .Net server, according to David Thompson, vice president of ...
In data communications it is desirable to have faster transfer rates at lower costs. Data compression addresses these demands by reducing the amount of data that must be transferred over a medium of ...
Today’s advanced malware threats are capable of changing behavior to block attempts to discover and remove them from systems. One of the most successful examples of malware deploying these techniques ...