August 1st, 2007
By Chad Perrin
Once you have security measures in place to protect you against unauthorized access to your computers and data, as well as the means to detect rootkits in case secu READ MORE http://blogs.techrepublic.com.com/security/...
April 30th, 2007
By John McCormick
Security management has a lot to do with details - staying on top of the latest threats and patching flaws. But sometimes, it has more to do with the big picture READ MORE http://blogs.techrepublic.com.com/security/...
July 22nd, 2007
By Chad Perrin
I regularly hear variations on a theme:
* "Security vendors blow the threat out of proportion. Don't worry so much about it."
* "I'm a careful computer user. I READ MORE http://blogs.techrepublic.com.com/security/...
July 23rd, 2007
By Joshua Hoskins
This blog post is also available in PDF form as a TechRepublic download.
If you use PCs for work, you must deal with the constant threat of viruses. Not only c READ MORE http://blogs.techrepublic.com.com/security/...
July 26th, 2007
By Mike Mullins
When administrators and security professionals hear the word rootkit, most think first of a UNIX-based system. Unfortunately, this only leads to a false sense of se READ MORE http://blogs.techrepublic.com.com/security/...
September 26th, 2007
By Chad Perrin
People have an unfortunate tendency to think of security as a set of practices performed almost by rote, locking down known means of compromising security. A mo READ MORE http://blogs.techrepublic.com.com/security/...
November 29th, 2007
By Mike Mullins
A long time ago, in a land forgotten by time (before Microsoft Windows 95), Windows computers and their programs had .ini (configuration) files that stored info READ MORE http://blogs.techrepublic.com.com/security/...
September 12th, 2007
By Chad Perrin
Once every couple months or so, I find myself explaining to someone that the flood of viruses everyone has come to expect is not an unavoidable side effect of a READ MORE http://blogs.techrepublic.com.com/security/...
March 1st, 2007
By Tom Olzak
Kernel malware, commonly known as rootkits, are malicious applications that run in the kernel of the OS with absolute rights to system resources. End user devices inf READ MORE http://blogs.techrepublic.com.com/security/...