Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Downloads // May 2009

    How do I... Block access to Web sites with ProCon Latte?

    There are times when you need to be able to block access to certain Web sites. There are plenty of applications out there that will allow you to control browsing via white lists. But none of them are as simple, and as effective, as ProCon Latte. Jack Wallen shows you...

    Provided By Jack Wallen

  • Downloads // Aug 2008

    How do I... Scan a hard drive for sensitive data with Spider?

    There are many reasons why you would want to do a thorough scan on a PC for specific data. However, large capacity hard drives can be difficult to scan without the right tool. One of the better tools for scanning hard drives is Spider from Cornell University. Jack Wallen shows...

    Provided By Jack Wallen

  • Downloads // Sep 2008

    How do I... Encrypt files with GPG4Win?

    File encryption has been a key component to safe business practices for a long time. Whether it is keeping the prying eyes of competitors out of your critical product information or keeping the prying fingers of unwanted users out of your company (or employees) information, encrypting data is important. Jack...

    Provided By Jack Wallen

  • Downloads // Oct 2008

    How do I... Block IP addresses with Peer Guardian 2?

    Network security doesn't end with the installation of a firewall or any automated security package. There are times when you'll need to block certain ranges of IP addresses (or known hosts) based on a service and/or block specific IP addresses from gaining access to your network (or machine.) Peer Guardian...

    Provided By Jack Wallen

  • Downloads // Oct 2008

    How do I... Use secure copy for file encryption in Windows?

    The secure copy command allows the user to securely copy files from a local machine to a remote machine with encryption. One of the easiest methods of achieving this feat is with WinSCP. Jack Wallen explains how to install, configure, and use this tool. This download is also available as...

    Provided By Jack Wallen

  • Downloads // Jun 2009

    How do I... Prevent users from running specific applications with Process Blocker?

    If you administer any significant number of Windows-based machines, there might be applications you do not want your users to be able to run. Jack Wallen explains how Process Blocker can help administrators control application access. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Jack Wallen

  • Downloads // Jul 2009

    How do I analyze network speeds and issues with M-Lab?

    M-Lab is an open, distributed platform that provides a set of easy to use but effective tools that will help diagnose your computer network.

    Provided By Jack Wallen

  • Downloads // Jul 2009

    How do I encrypt Thunderbird email with Enigmail?

    Enigmail is an extension that should be added by anyone needing security in their email exchanges. It takes the less-than-user-friendly task of encryption and makes it simple enough for anyone to use. Jack Wallen explains how it works. This download is also available as an entry in the

    Provided By Jack Wallen

  • Downloads // Aug 2009

    How do I change my MAC address with SMAC?

    SMAC is a MAC address changer that has a simple to use graphical interface that enables the less experienced user all the way up to the guru change a piece of hardware's MAC address. Jack Wallen shows you how it all works. This download is also available as an entry...

    Provided By Jack Wallen

  • Downloads // Sep 2013

    Free 20-day Trial: Netwrix Auditor Change Auditing for Your Active Directory

    Uncontrolled changes in Active Directory can lead to unauthorized additions to groups, modifications to objects and permissions, or even worse, deletions of your OUs. Netwrix Auditor provides complete visibility over changes to Active Directory configurations, automatically auditing management of every object, giving answers to the questions around when changes...

    Provided By netwrix

  • Downloads // Mar 2009

    How do I... Restore files from a damaged hard drive using ZAR?

    Zero Assumption Recovery (ZAR) is a shareware-based utility that can scan your hard drive for files, even if it has been re-formatted or is damaged, and recover them. Wally Bahny shows you how it works. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Wally Bahny

  • Downloads // Nov 2008

    Secure your computer after a Windows install or reinstall

    Microsoft recommends that you connect to the Internet to get the important security updates and service packs after a fresh install. But the catch-22 is that your computer is more vulnerable until the security updates are installed. Alan Norton details five ways to better secure your computer immediately following a...

    Provided By Alan Norton

  • Downloads // Dec 2009

    Lumension Security Application Scanner

    The Lumension Security Application Scanner is a network-based scanning utility that provides IT departments and executives the ability to discover what applications are running within a network. Unwanted and unauthorized applications can introduce malware, decrease performance, consume diskspace, waste network bandwidth and even slow user productivity. The Lumension Security Application...

    Provided By Lumension

  • Downloads // Feb 2010

    Don't make assumptions about coworkers based on their behavior

    Are you frustrated by an employee who exhibits a certain behavior? Try not to make assumptions about that person.

    Provided By Toni Bowers

  • Downloads // Sep 2009

    10 rules for the Twitter neophyte

    If you're just beginning to explore the potential benefits of Twitter, these recommendations will help you build a network that has some real value.This download is also available as an entry in our 10 Things blog.

    Provided By Jeff Cerny

  • Downloads // Jan 2009

    10 questions to simplify the new rules of IT compliance: An interview with Joe Degidio

    New security risks, along with increased demands for accountability, are changing the compliance picture. IT risk management and compliance expert Joe Degidio recently discussed the compliance landscape and the issues that organizations must understand and address.This download is also available as an entry in our 10 Things blog.

    Provided By Jeff Cerny

  • Downloads // Oct 2011

    10 security problems you might not realize you have

    It's easy to get distracted by high profile security threats and let the more subtle -- but equally destructive -- risks fall through the cracks.

    Provided By Justin James

  • Downloads // Jun 2009

    Designing database applications for optimal performance

    In his book review of Prentice Hall's The Data Access Handbook, TechRepublic blogger Justin James notes that chapter two provided him with more information about database connectivity than he learned during his years of working in the field. Download the chapter to get performance tips for using connection...

    Provided By Prentice Hall PTR

  • Downloads // Jul 2010

    Orion IP Address Manager - Automated IP Address Management

    SolarWinds Orion IP Address Manager (IPAM) provides detailed visibility into virtual & physical IP address space usage with advanced network scanning capabilities so you can minimize IP conflicts & ensure network availability. Say goodbye to pesky Excel spreadsheets and manage your IP address space automatically with Orion IP Address Manager....

    Provided By SolarWinds

  • Downloads // Nov 2013

    Your Network's Early Warning System

    Tired of getting calls asking if the network is down? SolarWinds® NPM works as your early warning system to quickly detect, diagnose, and resolve network performance problems and outages. Top 5 Reasons to Try SolarWinds Network Performance Monitor 1. Quick, Do-It-Yourself Deployment: Download. Install. Deploy. Deploying SolarWinds NPM...

    Provided By SolarWinds

  • Downloads // May 2014

    Recover from a Network Configuration Error in Under Five Minutes

    Researchers say that over 80% of network outages are caused by human error. Many errors are made when someone makes changes to a device configuration. When a network outage occurs, the standard triage questions are "what just happened", "did something fail or was something changed", and "how do we get...

    Provided By SolarWinds

  • Downloads // Apr 2013

    Ditch your spreadsheets & download a FREE IP Address Management Tool!

    Free IP Address Tracker from SolarWinds lets you track an unlimited number of IP addresses giving you a unified view of your entire IP address space. Now you can see which IP addresses are in use and which aren’t. Stop wasting precious time wading through cumbersome spreadsheets. Download free...

    Provided By SolarWinds

  • Downloads // May 2013

    Enhance IT Security with SolarWinds® Log & Event Manager

    What will you do when the security systems implemented to secure your IT environment are not secure anymore? Do you know what’s lurking in your network to exploit vulnerabilities and compromise IT security? SolarWinds Log & Event Manager (LEM) provides real-time insight and awareness into all your security, operational...

    Provided By SolarWinds

  • Downloads // Jun 2013

    Control Your IT Universe with DameWare: Remote Support Made Simple, Affordable & Mobile

    DameWare Remote Support (DRS) delivers the tools you need to remotely manage the Windows® desktops and laptops in your IT universe. DRS includes DameWare Mini Remote control for powerful remote troubleshooting & management. Comprehensive Active Directory functionality, including filtering objects & attributes. Inventory & manage everything from domains to logs...

    Provided By SolarWinds

  • Downloads // Nov 2012

    5 Free Tools for Network Troubleshooting & Monitoring

    The ability to monitor your network in real-time can mean the difference between stagnation and success. The right mix of solutions and strategy can help ensure that your online ecosystem is up and running at all times. SolarWinds tools enable you to configure, monitor and troubleshoot your network easily...

    Provided By SolarWinds

  • Downloads // Dec 2012

    Download a free 30-day trial of SolarWinds Server & Application Monitor now!

    Understanding how to achieve optimal performance for applications, hardware and operating systems will enable your organization to continually deliver on its core value proposition. Unfortunately, knowing what to monitor and how to resolve issues isn't intuitive. Finding the right technology partner to help guide this process across applications and platforms...

    Provided By SolarWinds

  • Downloads // Sep 2012

    LogMeIn: Smartphone and PC remote support that the pros use.

    LogMeIn Rescue provides instant access to PCs and mobile devices from anywhere in the world. LogMeIn Rescue enables IT to do more: quickly access, diagnose and solve IT problems anywhere. Remote reboot, easy-to-use screens, comprehensive reporting, multiple user sessions, and in-app Chat. Improve productivity, customer satisfaction and resolve issues...

    Provided By LogMeIn

  • Downloads // Aug 2010

    Support them where they are, from wherever you are. <br>LogMeIn Central.

    Sit back at your command center and take control of your IT universe. From one powerful web-based console, you can deploy unlimited amounts of remote access software to computers you support, then monitor them and manage them remotely. Real-time alerts let you know when something's going awry so you can...

    Provided By LogMeIn

  • Downloads // Jan 2009

    EventSentry - Real-Time Event Log, File, System Health & Network Monitoring

    Download your complimentary copy of the latest and affordable log and network monitoring software suite now! EventSentry, which supports Microsoft SQL Server, MySQL plus other databases, helps you and your company meet compliance requirements such as PCI. With reliable agents monitoring your system in real-time, you'll be alerted immediately through...

    Provided By Netikus.Net

  • Downloads // Jan 2009

    EventSentry Light - Real-Time Event Log, File, System Health & Network Monitoring

    EventSentry is the free edition of EventSentry, an event log and network monitoring suite. EventSentry sends alerts through a variety of notifications, and includes one of the most advanced filtering engine for events. EventSentry uses reliable agents which monitor your systems in real-time without any impact on performance. EventSentry also...

    Provided By Netikus.Net

  • Downloads // Oct 2012

    Server Backups and Configuration Management at Light Speed

    Don't allow simple tasks to delay your business processes and cost you money. Find out how to backup, transfer and secure your files with no effort at all. The need to automate new configurations and configuration backups has never been more important. As organizations expand internationally and more and...

    Provided By SolarWinds

  • Downloads // Dec 2009

    10 email scams to watch out for

    If it seems like you're getting hit with more email scams than ever, you're right. Deb Shinder explains what you and your users should watch out for to avoid being duped.This download is also available as an entry in our 10 Things blog.

    Provided By Deb Shinder

  • Downloads // Oct 2009

    10 common network security design flaws

    Solid planning and design can help reduce the potential for security breaches. Here are some security design missteps to watch out for.This download is also available as an entry in our 10 Things blog.

    Provided By Brien Posey

  • Downloads // May 2009

    10 Faces of Computer Malware

    Security blogger Michael Kassner offers a concise view of the current state of malware in a handy download that you can use to educate your staff and users on current security threats. This download contains a 15-slide Microsoft PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    E-mail links and attachments: Help stop malware from spreading

    Teach your users the basics about the prevention of malware with this handy PowerPoint presentation. Security blogger Michael Kassner presents common-sense tips on how to recognize potentially infected emails and how to handle them.

    Provided By Michael Kassner

  • Downloads // Sep 2008

    10+ things you should know about rootkits

    Malware-based rootkits fuel a multibillion dollar spyware industry by stealing individual or corporate financial information. If that weren't bad enough, rootkit-based botnets generate untold amounts of spam. Here's a look at what rootkits are and what to do about them.This download is also available as an entry in our...

    Provided By Michael Kassner

  • Downloads // Nov 2008

    10 answers to your questions about botnets

    Michael Kassner recently asked TechRepublic members to submit questions about botnets, promising to forward them to the experts at Arbor Networks. Dr. Jose Nazario volunteered to provide the following informative answers.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to avoid IT security breaches

    Completely eliminating security breaches may be an impossible task -- but that doesn't mean you shouldn't do everything possible to thwart attackers. Michael Kassner shares 10 easy-to-implement measures that will help protect your organization from security threats.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to secure the Apple iPhone

    Learn about the many options you can leverage to increase security of the Apple iPhone. This download includes a PowerPoint presentation and a PDF version of this detailed 10 Things blog entry by Michael Kassner.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 things you should know about developing an identity management system

    Everyone knows they should securely manage their user-account information, but what about administrative accounts? They're important, so why aren't they under the same microscope? Michael Kassner shares some things he learned while implementing an ID management system.This download consists of a PDF version of Michael's post in our 10...

    Provided By Michael Kassner