Michael Kassner

Displaying 1-19 of 19 results

  • Downloads // Aug 2011

    Android security test app

    It's estimated that more than half of all Android phones are operating with a security flaw that allow applications to enable GPS, Wi-Fi, and Bluetooth without the user's permission. This app will test your phone to see if it's one of them.

    Provided By Michael Kassner

  • Downloads // Oct 2010

    Five tips for getting rid of crapware

    New computers are being sold with crapware installed. I don't like it. I doubt that you do, either. Here's what we can do about it.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jun 2010

    10 Chrome extensions that enhance online security

    Google Chrome is known for being secure. But you can improve both online security and functionality with the help of these third-party extensions.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Feb 2010

    The top 10 spam botnets: New and improved

    Latest reports have spam accounting for more than 95 percent of all email messages. You can thank botnets for most of that. Here's what we're up against.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jan 2010

    10 indispensable iPhone apps for IT administrators

    There are many sophisticated iPhone applications that can simplify your life as a system or network admin. Michael Kassner highlights his favorites.This download is also available as a TechRepublic gallery and an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Nov 2009

    10 Firefox extensions that enhance security

    Compromising Web sites has become cybercriminals' favorite method of getting malware installed on computers. This PDF article and PowerPoint presentation offer 10 ways to beef-up Firefox and make it more difficult for the bad guys.The article in this download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Oct 2009

    10 more ways to detect computer malware

    TechRepublic members have spoken. Here are 10 anti-malware programs they find indispensable.This download includes both a PDF and a PowerPoint version of this 10 Things blog entry.

    Provided By Michael Kassner

  • Downloads // Aug 2009

    10 ways to detect computer malware

    In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware. This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jul 2009

    The 10 faces of computer malware

    The complexity of today's IT environment makes it easy for computer malware to exist, even flourish. Being informed about what's out there is a good first step to avoid problems.This download is available as an entry in our IT Security blog and as a PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 things you should know about developing an identity management system

    Everyone knows they should securely manage their user-account information, but what about administrative accounts? They're important, so why aren't they under the same microscope? Michael Kassner shares some things he learned while implementing an ID management system.This download consists of a PDF version of Michael's post in our 10...

    Provided By Michael Kassner

  • Downloads // Jun 2009

    E-mail links and attachments: Help stop malware from spreading

    Teach your users the basics about the prevention of malware with this handy PowerPoint presentation. Security blogger Michael Kassner presents common-sense tips on how to recognize potentially infected emails and how to handle them.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to secure the Apple iPhone

    Learn about the many options you can leverage to increase security of the Apple iPhone. This download includes a PowerPoint presentation and a PDF version of this detailed 10 Things blog entry by Michael Kassner.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to avoid IT security breaches

    Completely eliminating security breaches may be an impossible task -- but that doesn't mean you shouldn't do everything possible to thwart attackers. Michael Kassner shares 10 easy-to-implement measures that will help protect your organization from security threats.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // May 2009

    10 Faces of Computer Malware

    Security blogger Michael Kassner offers a concise view of the current state of malware in a handy download that you can use to educate your staff and users on current security threats. This download contains a 15-slide Microsoft PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // Dec 2008

    IPv6: What you need to know

    Converting to IPv6 is a major undertaking -- which may be why there aren't more network administrators excited about it. But like it or not, it's headed your way. In this collection of articles, Michael Kassner addresses real-world issues like why IPv6 is needed, what improvements it offers, what security...

    Provided By Michael Kassner

  • Downloads // Nov 2008

    10 answers to your questions about botnets

    Michael Kassner recently asked TechRepublic members to submit questions about botnets, promising to forward them to the experts at Arbor Networks. Dr. Jose Nazario volunteered to provide the following informative answers.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Nov 2008

    10+ answers to your questions about IPv6

    Michael Kassner recently asked TechRepublic members to share their questions about IPv6, promising to submit them to the experts at ARIN and Command Information. Both groups graciously responded, providing the following in-depth answers.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Sep 2008

    10+ things you should know about rootkits

    Malware-based rootkits fuel a multibillion dollar spyware industry by stealing individual or corporate financial information. If that weren't bad enough, rootkit-based botnets generate untold amounts of spam. Here's a look at what rootkits are and what to do about them.This download is also available as an entry in our...

    Provided By Michael Kassner

  • Downloads // Apr 2008

    10 Wi-Fi security tips for road warriors

    Road warriors have to be creative. Besides their normal work, they are asked to maintain an almost continuous electronic presence while away from their office or home -- and that can mean dealing with unknown and possibly hostile Wi-Fi networks. Michael Kassner offers some simple tips to help mobile workers...

    Provided By Michael Kassner

  • Downloads // Aug 2009

    10 ways to detect computer malware

    In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware. This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Sep 2008

    10+ things you should know about rootkits

    Malware-based rootkits fuel a multibillion dollar spyware industry by stealing individual or corporate financial information. If that weren't bad enough, rootkit-based botnets generate untold amounts of spam. Here's a look at what rootkits are and what to do about them.This download is also available as an entry in our...

    Provided By Michael Kassner

  • Downloads // Jan 2010

    10 indispensable iPhone apps for IT administrators

    There are many sophisticated iPhone applications that can simplify your life as a system or network admin. Michael Kassner highlights his favorites.This download is also available as a TechRepublic gallery and an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jul 2009

    The 10 faces of computer malware

    The complexity of today's IT environment makes it easy for computer malware to exist, even flourish. Being informed about what's out there is a good first step to avoid problems.This download is available as an entry in our IT Security blog and as a PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // Apr 2008

    10 Wi-Fi security tips for road warriors

    Road warriors have to be creative. Besides their normal work, they are asked to maintain an almost continuous electronic presence while away from their office or home -- and that can mean dealing with unknown and possibly hostile Wi-Fi networks. Michael Kassner offers some simple tips to help mobile workers...

    Provided By Michael Kassner

  • Downloads // Nov 2008

    10+ answers to your questions about IPv6

    Michael Kassner recently asked TechRepublic members to share their questions about IPv6, promising to submit them to the experts at ARIN and Command Information. Both groups graciously responded, providing the following in-depth answers.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Nov 2008

    10 answers to your questions about botnets

    Michael Kassner recently asked TechRepublic members to submit questions about botnets, promising to forward them to the experts at Arbor Networks. Dr. Jose Nazario volunteered to provide the following informative answers.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Dec 2008

    IPv6: What you need to know

    Converting to IPv6 is a major undertaking -- which may be why there aren't more network administrators excited about it. But like it or not, it's headed your way. In this collection of articles, Michael Kassner addresses real-world issues like why IPv6 is needed, what improvements it offers, what security...

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to avoid IT security breaches

    Completely eliminating security breaches may be an impossible task -- but that doesn't mean you shouldn't do everything possible to thwart attackers. Michael Kassner shares 10 easy-to-implement measures that will help protect your organization from security threats.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to secure the Apple iPhone

    Learn about the many options you can leverage to increase security of the Apple iPhone. This download includes a PowerPoint presentation and a PDF version of this detailed 10 Things blog entry by Michael Kassner.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 things you should know about developing an identity management system

    Everyone knows they should securely manage their user-account information, but what about administrative accounts? They're important, so why aren't they under the same microscope? Michael Kassner shares some things he learned while implementing an ID management system.This download consists of a PDF version of Michael's post in our 10...

    Provided By Michael Kassner

  • Downloads // Oct 2009

    10 more ways to detect computer malware

    TechRepublic members have spoken. Here are 10 anti-malware programs they find indispensable.This download includes both a PDF and a PowerPoint version of this 10 Things blog entry.

    Provided By Michael Kassner

  • Downloads // Nov 2009

    10 Firefox extensions that enhance security

    Compromising Web sites has become cybercriminals' favorite method of getting malware installed on computers. This PDF article and PowerPoint presentation offer 10 ways to beef-up Firefox and make it more difficult for the bad guys.The article in this download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Feb 2010

    The top 10 spam botnets: New and improved

    Latest reports have spam accounting for more than 95 percent of all email messages. You can thank botnets for most of that. Here's what we're up against.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jun 2010

    10 Chrome extensions that enhance online security

    Google Chrome is known for being secure. But you can improve both online security and functionality with the help of these third-party extensions.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Oct 2010

    Five tips for getting rid of crapware

    New computers are being sold with crapware installed. I don't like it. I doubt that you do, either. Here's what we can do about it.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Aug 2011

    Android security test app

    It's estimated that more than half of all Android phones are operating with a security flaw that allow applications to enable GPS, Wi-Fi, and Bluetooth without the user's permission. This app will test your phone to see if it's one of them.

    Provided By Michael Kassner

  • Downloads // May 2009

    10 Faces of Computer Malware

    Security blogger Michael Kassner offers a concise view of the current state of malware in a handy download that you can use to educate your staff and users on current security threats. This download contains a 15-slide Microsoft PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    E-mail links and attachments: Help stop malware from spreading

    Teach your users the basics about the prevention of malware with this handy PowerPoint presentation. Security blogger Michael Kassner presents common-sense tips on how to recognize potentially infected emails and how to handle them.

    Provided By Michael Kassner