Network intrusion detection and prevention and malware removal

Email Alerts

Register now to receive SearchEnterpriseDesktop.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • IT pros: We can't stop every threat

    Mergers, staff shortages and fast tech deployments mean some security incidents probably went undetected last year, a recent survey found, and many fear it will happen again. 

  • Learning Guide: End-user education

    With changes occurring so frequently in the computer world, especially the world of computer security, it is difficult for anybody outside of the IT industry to keep up with all of the latest security information that they need. That's where the edi... 

  • The top five Windows security threats - A hacker's valentine

    Hackers often utilize holidays to gain an advantage, so what more fitting way to ring in a Happy Valentine's day than to uncover a few nasty hacks involving your Windows systems? Here are five Windows threats from contributor Kevin Beaver that you sh... 

  • Keylogger basics

    Keyloggers are one of those malicious computer infections that are an explicit danger to your security. By logging sensitive information like passwords and credit card numbers keystroke loggers are more of a threat to security than annoying adware. C... 

  • Step-by-step guide: Blocking IM and P2P

    In the wrong hands, IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with fewer adverse effects -- than others. Contributor Serdar Yegulalp details the pr... 

  • Step 4: The "block the application" approach

    In the wrong hands IM and P2P file sharing can be too much of a risk for your organization. There are many ways to block this traffic, but some are more elegant -- with less adverse effects -- than others. Contributor Serdar Yegulalp details this pro... 

  • Microsoft takes another anti-rootkit step

    Writing kernel-mode Windows programs was never easy, but as of 64-bit Windows Vista, Microsoft won't even let just anyone do it. It will help stop some rootkits, but it's not a complete answer. 

  • Automate SQL injection testing

    Manual testing for SQL injection vulnerabilities can be an arduous process. New tools can automate the process. Contributor Kevin Beaver provides explains how automation helps and how it works. 

  • Best enterprise antispyware products of 2005

    In a surprising upset, a gateway appliance took home the gold award for best antispyware product of 2005 over the traditional client software-based solutions. Find out how in our Product of the Year reviews. 

  • Microsoft confirms Windows Wi-Fi flaw

    However, until a rollup patch is released, the software giant said Tuesday that users can take basic steps to protect themselves from the Windows wireless vulnerability.