Computer security software

Results: 11097



#Item
41Software / Antivirus software / Computer security / System software / Malwarebytes / Malware / Zero-day / Marcin Kleczynski

C A S E S T U DY At Colorado Springs School District 11, nothing holds students back— especially not malware School effectively protects 17,000 endpoints from CryptoWall and other malware

Add to Reading List

Source URL: nl.malwarebytes.com

Language: English - Date: 2016-07-07 18:38:56
42Software / Computer architecture / Computing / Cross-platform software / Oracle Database / Oracle Linux / Benchmark / MySQL / Windows Server / Linux / Oracle Corporation / Standard Performance Evaluation Corporation

CIS CONFIGURATION ASSESSMENT TOOL (CIS-CAT) Description CIS-CAT is a configuration assessment/audit software tool available to CIS Security Benchmarks Members. Written in Java, CIS-CAT: (a) reads those CIS Security Bench

Add to Reading List

Source URL: benchmarks.cisecurity.org

Language: English - Date: 2016-07-18 18:05:36
43System software / Software / Antivirus software / Computer security / Computer virus / Deception / Internet security / User Account Control / Malware

How-to guide. IMPORTANT! Make sure you remove the malware from your system first, otherwise it will repeatedly lock your system or encrypt files. Any reliable antivirus solution can do this for you. First, the tool searc

Add to Reading List

Source URL: noransom.kaspersky.com

Language: English - Date: 2016-07-25 08:15:55
44Computing / Computer architecture / Power Architecture / Software / AS/400 / Server hardware / IBM AIX / IBM RPG / Scott Klement / IBM WebSphere Application Server / IBM Notes / Cgidev2

Speaker Excellence Awards – 2009 Annual Meeting and Exposition Gold Medal Sessions Richard Dolewski • Disaster Recovery Primer - Ready, Set, Plan John Earl • IBM i Security by Object Type

Add to Reading List

Source URL: www.common.org

Language: English - Date: 2016-07-26 12:30:37
45Software / Computer access control / System software / Password / Security / Switch / Su / Identity management systems

CSUCI > Pharos Quick Reference Guide

Add to Reading List

Source URL: www.csuci.edu

Language: English - Date: 2015-03-18 16:52:07
46Computing / Software / Computer architecture / Smartphones / Android / Mobile security / Qualcomm / Rooting / BlackBerry Priv / Computer security / Linux kernel / Privilege escalation

QUADROOTER NEW VULNERABILITIES AFFECTING OVER 900 MILLION ANDROID DEVICES by the Check Point Research Team INTRODUCTION The cloak-and-dagger of cybercrime makes for entertaining theater.

Add to Reading List

Source URL: www.checkpoint.com

Language: English - Date: 2016-08-05 12:48:52
47Software / System software / Computing / Arxan Technologies / Antivirus software / Cyberwarfare / Mobile security / Android / Computer security / Avira / Malware / Anti-tamper software

Arxan Best Practices White Paper Effective Mobile Application Security Strategies TABLE OF CONTENTS

Add to Reading List

Source URL: www.arxan.com

Language: English - Date: 2016-08-01 23:53:33
48Computer access control / Cryptography / Software / Computer security / YubiKey / Hash-based message authentication code / Double-click / Configure script / Authentication

How to Configure Identical Credentials Configuration Guide

Add to Reading List

Source URL: www.yubico.com

Language: English - Date: 2016-06-22 18:25:41
49Software / Computing / Remote desktop / System software / X Window System / Virtual Network Computing / Thin client / Password / Computer security / GO-Global / Security and safety features new to Windows Vista

Secure Mobile Computing via Public Terminals Richard Sharp1 , James Scott1 and Alastair R. Beresford2 1 Intel Research, 15 JJ Thomson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-05-23 08:53:35
50Computing / Computer network security / Cyberwarfare / Multi-agent systems / Spamming / Recreational Software Advisory Council / Self-censorship / Botnet / Malware / Bitstream Cyberbit / Steganography / Censorship

SESSION ID: GPS2-F04 A Global Enterprise Confronts Targeted Attacks Ginnwann Teo Head of Pre-Sales

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2016-07-18 23:27:59
UPDATE