Software  >   Malware  >  

Encrypted Viruses

RSS Feed    Add to Google    Add to My Yahoo!
Encrypted VirusesMultimedia (View All Report Types)
 
Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006

Webroot

Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Targeted Attack Detection and Remediation Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this Security School lesson, you'll learn more about how targeted attacks are developed, where your soft spots may be, how attackers are moving data off your networks and what you can do about it.
Posted: 01 Apr 2013 | Premiered: 29 Mar 2013

SearchSecurity.com

Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
TRIAL SOFTWARE: This is a free trial download for a software backup solution from Acronis that offers an array of unique features
Posted: 25 Feb 2014 | Premiered: 25 Feb 2014

Acronis

What is driving transformation of data center networking?
sponsored by HP
WEBCAST: With the increase of employees communicating and receiving data from many different endpoints, having an agile and efficient network is a must-have. Virtualization has enabled IT professionals to work faster, but there is another strategy that may give better results.
Posted: 05 Aug 2014 | Premiered: Aug 5, 2014

HP

Getting the Most out of Your Windows Upgrade
sponsored by Dell, Inc. and Windows 8 Pro
VIDEOCAST: This webinare from Dell explains how the end of Microsoft XP support will impact organizations still using it. It also talks about challenges of migration from either XP or Windows 7 or 8 and touches on what's next for organizations who have already migrated.
Posted: 26 Mar 2014 | Premiered: Mar 26, 2014

Dell, Inc. and Windows 8 Pro

Drive a New Open Networking Environment
sponsored by Dell, Inc.
VIDEO: Access this brief video to learn how you can speed innovation by implementing standards-based networking equipment, operating systems, and applications based on your unique requirements.
Posted: 11 Sep 2014 | Premiered: 11 Sep 2014

Dell, Inc.

Introducing Red Hat CloudForms 3.0
sponsored by Red Hat
WEBCAST: Did you know that the number one challenge people face when making the shift to cloud is management? Take a look at this brief webcast to learn about the software that will help you organization management.
Posted: 05 Dec 2013 | Premiered: Nov 5, 2013

Red Hat

Hidden Lynx – Professional Hackers for Hire
sponsored by Symantec Corporation
WEBCAST: This in-depth resource explores the strategies behind hackers-for-hire and what you can do to prevent them from compromising your system.
Posted: 17 Feb 2014 | Premiered: Feb 17, 2014

Symantec Corporation

Inside IT: Stopping Security Threats in an Ever-Changing Landscape
sponsored by Intel
PODCAST: In this podcast, Intel's CISO Malcolm Harkins discusses the ever-changing security and threat landscapes and explains why adding advanced protection to your current systems is crucial to staying secure.
Posted: 27 Dec 2012 | Premiered: Dec 27, 2012

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement