Tuesday 27 March 2012

[TechRepublic] Attacked by Anonymous: How to defend against a DoS

IT Security

TechRepublic Member | March 27, 2012

Attacked by Anonymous: How to defend against a denial-of-service

Alfonso Barreiro witnessed an Anonymous-led attack firsthand. Here is a description of their primary weapons and the countermeasures that can be taken against them. Read more

Resource of the day

Live Webcast: Businesses Using Microsoft Office 365 Experience Amazing ROI

With your business moving to the cloud, you know you can trust MS Office 365 to deliver the same functionality, but with better collaboration tools. Register for this webcast to learn more about MS Office 365, and what it can do for you.


Mobile password managers: Cracking the security mechanisms

Password managers for mobile devices are convenient. But are the cached passwords sufficiently protected? Michael Kassner asks two experts to explain the vulnerabilities. Read more

Putting passwords out to pasture: Identity behaviour vs. identity authentication

Dominic Vogel writes that the days of relying on passwords, strong or otherwise, is an outdated security practice. What's the next step? Read more

Additional TechRepublic resources

 

Solving a problem with BitLocker Encryption

When end users complained of "stuttering" after an encryption solution roll-out, Lauren Malhoit found a fix with BitLocker. Read more

iTwin: Creating a secure, 'unlimited' USB drive

Paul Mah examines the iTwin and its promises of simple and secure file transfer between two online computers. Read more

BT releases Rabit to catch cable thieves

Can a new network 'burglar alarm' cut the damage that metal thieves are causing disruption to BT's national network? Read more

Encrypt your smartphone voice communications with TrustCall

Deb Shinder tested a voice encryption solution called TrustCall. Find out how TrustCall works and if it's right for your organization. Read more

Featured multimedia

 

Five easy-to-use Linux encryption tools

Even a timid Linux user can handle encryption with the help of the right tool. Here are some good, user-friendly options. View on site



Today's recommended downloads

Download the IDC Ten Best Practices Report: Cloud Service Selection and Management (CSC)

Business Execution: Executive Buyer's Guide (SuccessFactors)

Beyond Simple Total Cost of Ownership (SuccessFactors)

The Magic of Scalability (Hewlett-Packard (HP))

Video: Panasonic Chooses Collaboration (IBM)


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Previewing Boot to Gecko

Chris Duckett runs the ruler over Boot to Gecko, Mozilla's HTML-based operating system for mobile devices.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is habib2best@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment