Software  >  

Joke Programs

RSS Feed    Add to Google    Add to My Yahoo!
Joke ProgramsMultimedia (View All Report Types)
 
Gaining credibility in the fight against spam
sponsored by Symantec Hosted Services
PODCAST: In this expert podcast, we look at what role reputation systems play in gaining credibility in the fight against spam.
Posted: 24 Mar 2008 | Premiered: Mar 24, 2008, 09:00 EDT (13:00 GMT)

Symantec Hosted Services

Secure Web Gateways Decision Center
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This Decision Center will help sort the different feature options and deployment challenges and help you bring efficiency to your threat management programs by centralizing Web-based security and stop managing numerous standalone Web security products.
Posted: 29 Oct 2013 | Premiered: 23 Sep 2013

SearchSecurity.com

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

Deep Security 7.5
sponsored by Trend Micro, Inc.
VIDEO: Protect your virtualized environment by learning what Deep Security 7.5 can do for you. Watch this video to learn so much more about Deep Security 7.5.
Posted: 15 Sep 2010 | Premiered: 15 Sep 2010

Trend Micro, Inc.

Protecting Your Multi-Platform Network: The New Wave of Attacks
sponsored by ESET
WEBCAST: Join us to examine some of the malware risks associated with heterogeneous computing environments and solutions to protect your valuable business assets.
Posted: 20 Jun 2011 | Premiered: Jun 20, 2011

ESET

Stealthy Threats: Driving a New Approach to Security Video
sponsored by Intel
WEBCAST: View this Webcast and uncover the steps to a new approach to security. Today, the threat landscape is more dangerous than ever before, so make sure you have the right security to mitigate the risks.
Posted: 01 Oct 2012 | Premiered: Oct 1, 2012

Intel

The Malware Report: Hotel Business Center PCs Strike Again
sponsored by ESET
PODCAST: Matt Grant talks with Randy Abrams about security issues with hotel business center computers. These are public computers and they often have insufficient security features. In this podcast, Randy shares some interesting things he’s found in hotel computers and gives some advice on using them safely.
Posted: 29 Oct 2009 | Premiered: Aug 20, 2009

ESET

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement