Thursday, 23 February 2012

Five apps to wipe data from your Android phone

Five Apps

TechRepublic Member | February 23, 2012

Five apps for securely wiping your Android phone

Resource of the day

Netshelter CX Enclosure - Product Demonstration

With the Netshelter CX enclosure, you'll be able to set up a server nearly anywhere. It's the IT industry's first soundproofed, portable server environment. Check out this video to learn more.

Hottest new lists


Five reliable Windows Server backup solutions

When disaster strikes (and it will), you can put the pieces back together if you've got a solid backup solution in place. Read more

Five powerhouse finance packages designed for SMBs

Finding accounting software that fits your needs can be tricky. See if one of the solutions on this list offers the right feature set for the right price. Read more

Additional TechRepublic resources


Five ways Apple will think differently under Tim Cook

Tim Cook has already proved himself a safe pair of hands as Steve Jobs' successor at the Apple helm. But pointers are now emerging about his plans for taking the company forward. Read more

Improve your productivity with Visual Studio 2010 Extensions

Tony Patton highlights several Visual Studio 2010 Extensions that simplify his daily work and save him some time and frustration. Read more

Add Google Docs to the Windows 7 New menu

With a Windows Registry edit you can add Google Docs to the entries listed in the Windows 7 New menu. Read more

Featured multimedia


10 indispensable Android apps

This new collection of Android apps features everything from a friendly keyboard to a convenient payment processor to a versatile music player. View on site

Today's recommended downloads

Live Webcast: Top Considerations for Effective Managed Security for 2012 and Beyond (AT&T)

Netshelter CX Enclosure - Product Demonstration (APC by Schneider Electric)

Virtualization and Cloud Computing: Optimized Power, Cooling, and Management Maximizes Benefits (APC by Schneider Electric)

Live Webcast: Fast and Efficient Business Security Strategies (GFI Software)

Preventing Data Corruption in the Event of an Extended Power Outage (APC by Schneider Electric)

Connect with TechRepublic

TechRepublic Facebook Fan Page

Follow TechRepublic on Twitter

How much has cyber-spying changed since 1989? Not as much as you'd think

Bob Eisenhardt looks back at Clifford Stoll's classic cyber-spying true story from 1989 and poses the question, how much has really changed in the world of cyber-espionage? Not that much, as it turns out.

TechRepublic newsletters


Get product reviews, tech news analysis, tips, and more in the following TechRepublic newsletters. Automatically sign up today!

TechRepublic UK

TechRepublic Australia Wrapper

Web Designer

The Enterprise Cloud

Tablets in the Enterprise

Google in the Enterprise

Send us your feedback here.

Sign up for more free newsletters from TechRepublic!
To manage your account settings or to remove yourself from all TechRepublic communications, please visit our Subscription Center.

The e-mail address for your subscription is
Unsubscribe from this e-mail | FAQ | Advertise | Privacy Policy

Tr Footer Logo

Copyright 2012 CBS Interactive, Inc. All rights reserved.
TechRepublic is a registered service mark of CBS Interactive, Inc.

235 Second Street
San Francisco, CA 94105

No comments:

Post a Comment