Video Screencast Help

File Encryption

Results for File Encryption

Performing a web application penetration test is not voodoo magic, but rather an exercise in knowledge, prioritization, and efficiency. During years of hard work penetration testers hone their methodology and develop efficient ways of applying their ...
Blog Entry by vince_kornacki | 19 Feb 2013 | 2 comments
I need a solution Just purchased this online and downloaded the .ZIP archive file. When I try to open it, I get "Cannot open file: it does not appear to be a valid ...
Forum Discussion by fedupwithsupport | 13 Feb 2013 | 1 comment
Information Technology is radically changing. We can wrap it in terms and buzzwords like cloud, mobility, BYOD, Web 3.0, but the reality is both the sum of and more complex than the names we give it. IT is no longer in the hands of the professionals. ...
Blog Entry by PaulTobia | 12 Feb 2013 | 0 comments
Webcast Tue, 05 March, 2013 - 14:00 - 15:00 CET As the IT landscape has rapidly evolved, companies ...
Event by Jessica Schoenfeld | 08 Feb 2013 | 0 comments
Webcast Wed, 20 March, 2013 - 14:00 - 15:00 CET Da sich die IT-Landschaft rasant entwickelt, stehen ...
Event by Jessica Schoenfeld | 08 Feb 2013 | 0 comments
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 07 Feb 2013 | 0 comments
Symantec security response has posted a write-up about a new Android threat, Android.Claco (also known as SuperClean) that poses new challenges to security teams in a world of BYOD.  You can read about the threat here: ...
Blog Entry by uuallan | 05 Feb 2013 | 1 comment
In part 1 of this series, we looked at three possible signs you may have been the victim of an APT and how to detect and defend against these activities:  1)Gaps in System and Security Logs; 2) Unexplained Changes in System Configurations; and 3) ...
Blog Entry by franklin-witter | 05 Feb 2013 | 0 comments
InfoWorld recently ran an interesting article discussing 5 signs that indicate you might be the victim of an Advanced Persistent Threat ( ...
Blog Entry by franklin-witter | 01 Feb 2013 | 1 comment
In the past, it was fairly easy to keep corporate data protected by keeping it within an established perimeter—protected by established access controls and passwords.  That model has been blown apart as iPhone, iPad and other smartphones and tablets have ...
Blog Entry by Kelvin_Kwan | 28 Jan 2013 | 0 comments