• October 29, 2007 29 Oct'07

    Big personnel change in biz-apps world

    It's been an active autumn among top-level business applications execs. First, in a shake-up, Sage Software nuked a big part of its Americas leadership. Ron Verni and channel-and-strategy chief   ...  Continue Reading

  • October 29, 2007 29 Oct'07

    IBM plans more security research, acquisitions

    News headlines for the week of Oct. 29:

  • IBM to spend $1.5B on security research, acquisitions.
  • Symantec settles lawsuit.
  • Macrovision, Thinstall integrate virtualization.  Continue Reading

  • October 29, 2007 29 Oct'07

    Microsoft Dynamics CRM price cut helps partners in CRM market

    Hosting partners can use the cut in Microsoft Dynamics CRM subscription fees to build stronger relationships with clients in the customer relationship management market.  Continue Reading

  • October 29, 2007 29 Oct'07

    Open source applications: More than just Linux

    Open source applications and development tools cover a spectrum ranging from databases to office productivity suites. This fifth installment of our Open Source Reseller Services Hot Spot Tutorial introduces you to applications other than Linux and ...  Continue Reading

  • October 29, 2007 29 Oct'07

    Tracking botnets

    Tracking botnets takes several technical steps, starting with data gathering and information extraction. Get a detailed walk-through in this book excerpt.  Continue Reading

  • October 29, 2007 29 Oct'07

    Bot and botnet 101

    Bots can be controlled by attackers and used simultaneously with other bots under a botnet. Learn the basics of bots and botnets and how they can be used as spyware.  Continue Reading

  • October 29, 2007 29 Oct'07

    Case studies

    The botnet conclusions drawn in the earlier sections are based on research and observations. Read the case studies used by the authors in this excerpt.  Continue Reading

  • October 29, 2007 29 Oct'07

    Virtual honeypots: Tracking botnets

    As a security device, virtual honeypots are as effective as traditional honeypots but easier to build, deploy and maintain. In this book excerpt from Addison-Wesley, you'll learn about the danger of botnets and how honeypots can help you track down ...  Continue Reading

  • October 29, 2007 29 Oct'07

    Botnets summary

    Read a broad overview of the botnets and virtual honeypots covered in the chapter excerpt from Addison-Wesley.  Continue Reading

  • October 29, 2007 29 Oct'07

    Defending against bots

    Learn several ways to defend your clients' computers against bots and stop the threat.  Continue Reading

-ADS BY GOOGLE

MicroscopeUK

SearchSecurity

SearchStorage

SearchNetworking

SearchCloudComputing

SearchDataManagement

SearchBusinessAnalytics

Close