Please turn on your JavaScript for this page to function normally.
Top 10 Web 2.0 Attack Vectors

Web 2.0 is the novel term coined for new generation Web applications. start.com, Google maps, Writely and MySpace.com are a few examples. The shifting technological landscape …

A New Approach To Data Protection And Management

In the struggle to ensure data protection, reduce backup windows, and manage costs – both capital and operational – IT managers face increasing challenges. …

Top 5 Tips to NOT Get Hacked Online

“Oh my God, I’m never doing anything on-line again!,” is a common reaction to one of my web application hacking presentations. Recently I’ve been …

Raman Amplification in Storage Area Networking

Enterprise requirements for business-continuity and disaster-recovery solutions continue to grow more demanding. An example can be found in the drive to lengthen the distances …

Using Pict Encrypt for steganography purposes on Mac OS X

Steganography is the art and science of writing hidden messages in such a way that no one apart from the intended recipient knows of the existence of the message. Pict Encrypt …

Constructing Secure Storage Area Networks

Increasingly concerned about the availability of their business data, many enterprises over the last five years have implemented sophisticated storage area networks (SANs). …

Interview with Vladimir Katalov, CEO of ElcomSoft

Vladimir Katalov is working in ElcomSoft from the very beginning. He created the first program the password recovery software line has started from: Advanced ZIP Password …

The Changing Face of Disaster Recovery

Disaster recovery and remote office replication are increasingly becoming top-of-mind issues for IT professionals. It is ironic that tape, the most operationally unpredictable …

Network Attacks: Analysis of Department of Justice Prosecutions 1999 – 2006

A landmark study on Department of Justice network crime prosecutions reveals most attacks used stolen IDs and passwords, resulting in far greater damages to affected …

Intelligent Data Protection in Today’s Enterprise

As information becomes increasingly more valuable to enterprises, IT organizations must overcome some daunting and complex data protection challenges, such as recoverability, …

Assessing Java Clients with the BeanShell

Assessing the security of Java applications, and particularly client-server applications, can be a tedious process of modifying the code, compiling, deploying, testing and …

What Should Businesses Require of Data Protection Solutions?

Data protection today is one of the most innovative and fast-moving areas of Information Technology. Data protection technology developers have, in recent years, engaged in …

Don't miss

Cybersecurity news