Security

What's worse than getting hit with a security breach? Getting hit with an easily preventable one.

  • Downloads // Aug 2009

    Podcast: Staying competitive and Showing ROI

    According to recent research conducted by IBM? ISS X-Force?, more than half of all disclosed vulnerabilities in 2008 were Web application flaws. Learn how IBM Web application security solutions can help you reduce costs, manage risk and improve service. Listen to the podcast.

    Provided By IBM

  • Downloads // Aug 2009

    10 ways to detect computer malware

    In the ongoing war against malware threats, you need tools that will baseline your system, detect vulnerabilities, and remove existing malware. This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // Aug 2009

    Monitor your system for threats with rsec alerts

    Vincent Danen gives an overview of the monitoring and reporting tool rsec, which can help you keep a close eye on your system's security without having to pore over log files.

    Provided By Vincent Danen

  • Downloads // Aug 2009

    How do I change my MAC address with SMAC?

    SMAC is a MAC address changer that has a simple to use graphical interface that enables the less experienced user all the way up to the guru change a piece of hardware's MAC address. Jack Wallen shows you how it all works. This download is also available as an entry...

    Provided By Jack Wallen

  • Downloads // Aug 2009

    Secure remote firewall administration via SSH

    Most firewall systems contain a Web-based component that allows you to configure the firewall, but it's not very secure. Vincent Danen shows you a method via SSH that has the advantage of authentication and strong encryption.

    Provided By Vincent Danen

  • Downloads // Jul 2009

    How do I encrypt Thunderbird email with Enigmail?

    Enigmail is an extension that should be added by anyone needing security in their email exchanges. It takes the less-than-user-friendly task of encryption and makes it simple enough for anyone to use. Jack Wallen explains how it works. This download is also available as an entry in the

    Provided By Jack Wallen

  • Downloads // Jul 2009

    How do I analyze network speeds and issues with M-Lab?

    M-Lab is an open, distributed platform that provides a set of easy to use but effective tools that will help diagnose your computer network.

    Provided By Jack Wallen

  • Downloads // Jul 2009

    The 10 faces of computer malware

    The complexity of today's IT environment makes it easy for computer malware to exist, even flourish. Being informed about what's out there is a good first step to avoid problems.This download is available as an entry in our IT Security blog and as a PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // Jul 2009

    10 things you should cover in your social networking policy

    As sites like LinkedIn, Twitter, and Facebook become enmeshed with business uses, organizations need to establish guidelines for employees on workplace access and appropriate usage. Deb Shinder looks at 10 key considerations that such guidelines should address.This download is also available as an entry in our 10 Things blog.

    Provided By Deb Shinder

  • Downloads // Jul 2009

    10 ways technology can help (or hurt) your professional image

    Increasingly sophisticated communications options have introduced a number of gotchas into the business world. Calvin Sun looks at some phone, email, and voicemail best practices that will help ensure that you make the right impression.This download is also available as an entry in our 10 Things blog.

    Provided By Calvin Sun

  • Downloads // Jun 2009

    Sample social networking policy

    IT Pro Rick Vanover has crafted a sample social networking policy that you can customize to fit the needs of your organization. As sites like LinkedIn, Twitter, and Facebook become more intertwined with business uses, you need to establish clear guidelines for employees on workplace access and appropriate usage as...

    Provided By Rick Vanover

  • Downloads // Jun 2009

    10 things you should know about developing an identity management system

    Everyone knows they should securely manage their user-account information, but what about administrative accounts? They're important, so why aren't they under the same microscope? Michael Kassner shares some things he learned while implementing an ID management system.This download consists of a PDF version of Michael's post in our 10...

    Provided By Michael Kassner

  • Downloads // Jun 2009

    10 ways to avoid viruses and spyware

    To have a fighting chance against today's rampant security threats, end users have to be informed and proactive. Here are some practical guidelines they can follow to minimize the risk of infection and attack.This download is also available as an entry in our 10 Things blog.

    Provided By Erik Eckel

  • Downloads // Jun 2009

    Designing database applications for optimal performance

    In his book review of Prentice Hall's The Data Access Handbook, TechRepublic blogger Justin James notes that chapter two provided him with more information about database connectivity than he learned during his years of working in the field. Download the chapter to get performance tips for using connection...

    Provided By Prentice Hall PTR

  • Downloads // Jun 2009

    E-mail links and attachments: Help stop malware from spreading

    Teach your users the basics about the prevention of malware with this handy PowerPoint presentation. Security blogger Michael Kassner presents common-sense tips on how to recognize potentially infected emails and how to handle them.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    Quest MessageStats? - Over 15 Million Exchange Mailboxes Can't Be Wrong

    For the most complete messaging reporting and analysis solution in the industry, nothing beats Quest MessageStats?. MessageStats quickly and easily provides the critical information you need to understand and control costs and optimize your messaging environment. Supported platforms include: Microsoft Exchange BlackBerry? SendMail/PostFix Quest Archive Manager OWA (Outlook Web...

    Provided By Dell Software

  • Downloads // Jun 2009

    End-user password security

    Protecting your organization's important data starts with password security best practices. Use this Microsoft PowerPoint presentation to teach your users how to create strong passwords that are easy to remember.

    Provided By TechRepublic.com

  • Downloads // Jun 2009

    10 ways to secure the Apple iPhone

    Learn about the many options you can leverage to increase security of the Apple iPhone. This download includes a PowerPoint presentation and a PDF version of this detailed 10 Things blog entry by Michael Kassner.

    Provided By Michael Kassner

  • Downloads // Jun 2009

    How do I... Prevent users from running specific applications with Process Blocker?

    If you administer any significant number of Windows-based machines, there might be applications you do not want your users to be able to run. Jack Wallen explains how Process Blocker can help administrators control application access. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Jack Wallen

  • Downloads // Jun 2009

    10 ways to avoid IT security breaches

    Completely eliminating security breaches may be an impossible task -- but that doesn't mean you shouldn't do everything possible to thwart attackers. Michael Kassner shares 10 easy-to-implement measures that will help protect your organization from security threats.This download is also available as an entry in our 10 Things blog.

    Provided By Michael Kassner

  • Downloads // May 2009

    How do I... Block access to Web sites with ProCon Latte?

    There are times when you need to be able to block access to certain Web sites. There are plenty of applications out there that will allow you to control browsing via white lists. But none of them are as simple, and as effective, as ProCon Latte. Jack Wallen shows you...

    Provided By Jack Wallen

  • Downloads // May 2009

    Gain timely personal access into your business

    Xcelsius software, an easy-to-use add-on for Microsoft Excel and databases, enables the creation of consolidated dashboard-style views of key metrics so you can answer business questions at a glance. Use gauges, charts, sliders, dials, and menus to interact with your data like never before. Evaluate and forecast next steps with...

    Provided By SAP

  • Downloads // May 2009

    10 Faces of Computer Malware

    Security blogger Michael Kassner offers a concise view of the current state of malware in a handy download that you can use to educate your staff and users on current security threats. This download contains a 15-slide Microsoft PowerPoint presentation.

    Provided By Michael Kassner

  • Downloads // May 2009

    10+ reasons why people write viruses

    Why do people write viruses and other mobile malicious code? The answer isn't as simple as it used to be. Here are some possible motives suggested by security expert Chad Perrin and several TechRepublic members.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // May 2009

    Sophos Endpoint Assessment Test

    Is your computer a security risk? Free scan to assess your security Find out if you're missing OS patches Discover if your security applications are up to date and active Use this free test to check your computer security. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Threat Detection Test

    Is your anti-virus catching everything it should? Free virus, spyware, and adware scan Test your existing anti-virus protection Find threats your anti-virus missed Use this free test to check your anti-virus protection. Download now!

    Provided By Sophos

  • Downloads // May 2009

    Sophos Security Assessment Tools

    Put the diagnostic power of these FREE security tools to work in your enterprise today. From endpoint assessment and threat detection to identifying rootkits and unauthorized applications, these complimentary tools from industry leader Sophos will pinpoint any areas of vulnerability that exist on your network. Download and run these four...

    Provided By Sophos

  • Downloads // May 2009

    Podcast: 10 Things Small Businesses Must do to Protect & Secure Data

    Small business owners and IT personnel agree that securing and backup up their data is critical - yet why are so many businesses falling short? Often, they need best practices to know where to begin. Donna Childs, author and small business consultant provides guidelines so small businesses can take the...

    Provided By Symantec

  • Downloads // Apr 2009

    10 tips for secure computer disposal

    If you're in charge of IT resources at an organization with more than a handful of users, you might need this advice for secure equipment disposal.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Apr 2009

    Using encrypted filesystems with Linux Logical Volume Manager

    Vincent Danen favors the Logical Volume Manager (LVM) for easy partitioning in Linux and tells you how to take advantage of its volume encryption feature.

    Provided By Vincent Danen

  • Downloads // Mar 2009

    10 free security tools that actually work

    Plenty of solid products are available to help you protect your system -- and some of them don't cost a dime. Here's a list of some of the most popular and effective free tools for defending yourself against a variety of threats.This download is also available as an entry...

    Provided By Susan Harkins

  • Downloads // Mar 2009

    10 security threats to watch out for in 2009

    Along with the explosion of new technologies, user habits, and social practices comes the inevitable wave of new security threats. Deb Shinder examines emerging vulnerabilities, from social networking to cloud computing to IP convergence.This download is also available as an entry in our 10 Things blog.

    Provided By Deb Shinder

  • Downloads // Mar 2009

    10 ways to protect yourself when you leave a job

    Employers aren't the only ones who have to look after security when an employee leaves. If that departing employee is you, make sure you pay attention to threats to your personal privacy and security.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Mar 2009

    How do I... Restore files from a damaged hard drive using ZAR?

    Zero Assumption Recovery (ZAR) is a shareware-based utility that can scan your hard drive for files, even if it has been re-formatted or is damaged, and recover them. Wally Bahny shows you how it works. This download is also available as an entry in the TechRepublic Microsoft Windows Blog.

    Provided By Wally Bahny

  • Downloads // Feb 2009

    10 ways to manage your risk with Web applications

    Web apps continue to grow in popularity, but companies have legitimate concerns about security and reliability. Here are some ways to address potential risks and make sure you choose the right vendor.This download is also available as an entry in our 10 Things blog.

    Provided By Polly Schneider Traylor

  • Downloads // Feb 2009

    10 ways to protect your company from employee transition risks

    Employment transition is an often overlooked danger to company security. Make sure you have policies and procedures in place that will protect your business from security compromises when someone leaves your company.This download is also available as an entry in our IT Security blog.

    Provided By Chad Perrin

  • Downloads // Feb 2009

    10 tech mistakes small businesses make (and how IT consultants can help clients avoid them)

    Small businesses must concentrate their time and energy on knowing their own industry -- and that often means that effective technology practices get overlooked. Erik Eckel explains the most common tech missteps he's encountered, along with preventive measures to protect businesses and prevent serious problems.This download includes a PDF version...

    Provided By Erik Eckel

  • Downloads // Feb 2009

    10+ ways to avoid misunderstandings at work

    Miscues happen all the time in business communications, and the results can range from annoying to disastrous. Here are some simple rules to follow that can save you a world of trouble when dealing with colleagues and partners.This download is also available as an entry in our 10 Things blog.

    Provided By Calvin Sun

  • Downloads // Jan 2009

    Get started with the security tool OSSEC

    Of the many open source security tools out there, Vincent Danen singles out OSSEC as a solid, cross-platform tool that provides intrusion detection techniques such as log analysis, rootkit detection, file integrity checking, active response to identified threats, real-time alerting and, for Windows client systems, registry monitoring.

    Provided By Vincent Danen

  • Downloads // Jan 2009

    10 questions to simplify the new rules of IT compliance: An interview with Joe Degidio

    New security risks, along with increased demands for accountability, are changing the compliance picture. IT risk management and compliance expert Joe Degidio recently discussed the compliance landscape and the issues that organizations must understand and address.This download is also available as an entry in our 10 Things blog.

    Provided By Jeff Cerny