Toolbox for IT - Adventures in Security: Trojan Defense: Configuring Your SOHO or Personal Infrastructure
By Tom Olzak
Apr 9, 2010
Trojans continue to be a serious Internet threat and arguably the most insidious. As with any malware defense, making the right choices - and teaching users to do the same - is the only effective control. Further, continuous vigilance is required to detect and react to Trojan polymorphism.
Click the URL above to read the full article
Votes:12