Tuesday 20 December 2011

[TechRepublic] REMnux: Reverse-engineering malware

IT Security

TechRepublic Member | December 20, 2011

REMnux: Reverse-engineering malware

"Know thy enemy" is a well-worn phrase. No matter; the saying is germane when it comes to malicious code. Michael Kassner looks at a toolkit that reverse-engineers malware. Read more

Resource of the day

How a North York General Hospital doubles storage performance

At North York hospital, they faced limitations in their IT infrastructure and knew it was time to upgrade. Check out this white paper to learn how they were able to cut costs and simplify management by standardizing on IBM XIV.


Bitdefender's cloud-based security tools worth investigating for SMBs

Steven Trippe describes Bitdefender's cloud security services and points out issues to consider for SMBs weighing security solutions. Read more

A look into Microsoft Security Essentials 2012

Scott Lowe takes a detailed view into the Microsoft Security Essentials latest build, still in beta, noting some of the changes and performing some basic testing. Read more

Additional TechRepublic resources

 

10 holiday-busting IT crises

We asked TR members to share their memories of holidays that went awry because of a work emergency. Here are 10 such tales, plus one vacation horror story. Read more

Bring Your Own Device: Risks and rewards

With BYOD, there is risk and reward, an ongoing conversation and a lot of running around with your hair on fire to get it to function at scale in the enterprise but it might just be worth it in the end. Read more

Featured multimedia

 

Desktop Wallpaper: Northern lights

The Winter Solstice is approaching, which means winter, which means cold weather and long nights. And for the kid in all of us it brings up memories of the North Pole. Imagine going to work under the colorful aurora borealis (northern lights). View on site



Today's recommended downloads

Allocating Data Center Energy Costs and Carbon to IT Users (American Power Conversion (APC))

Need a Long-Term Archive Solution? Read On (Quantum)

How a North York General Hospital doubles storage performance (IBM)

Live Webcast: The Power Behind Data Mining & Analytics (IBM)

Rack Powering Options for High Density (American Power Conversion (APC))


Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

Last-minute geeky gifts to avoid

Wally Bahny thinks these geeky gifts are not worth buying because they will lose their luster after a few minutes or one use. See if you agree with his list.



TechRepublic newsletters

 

Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

App Builder

10 Things




Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is habib2best@gmail.com.
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2011 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

TechRepublic
235 Second Street
San Francisco, CA 94105
U.S.A.

No comments:

Post a Comment