Software  >   Malware  >  

Self-replicating Viruses

RSS Feed    Add to Google    Add to My Yahoo!
Self-replicating Viruses Multimedia (View All Report Types)
Webroot Enterprise Spy Audit
sponsored by Webroot
TRIAL SOFTWARE: Spyware is a dynamic threat that requires a dedicated solution to defeat it. This free IT download performs a spyware audit throughout your system to provide a clear view of the system's status, helping you manage the threat of harmful intruders.
Posted: 16 Oct 2006 | Premiered: 16 Oct 2006


Kaspersky Internet Security 7.0
sponsored by Kaspersky Lab
TRIAL SOFTWARE: Try this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
Posted: 16 Nov 2007 | Premiered: 01 Nov 2007

Kaspersky Lab

Introducing Red Hat CloudForms 3.0
sponsored by Red Hat
WEBCAST: Did you know that the number one challenge people face when making the shift to cloud is management? Take a look at this brief webcast to learn about the software that will help you organization management.
Posted: 05 Dec 2013 | Premiered: Nov 5, 2013

Red Hat

Sandboxing: CPU-Level Threat Prevention
sponsored by Check Point Software Technologies Ltd.
VIDEO: This brief video explores how you can detect advanced malware that hides in the CPU-level of an application. Discover how you can stop even the most advanced and evasive threats.
Posted: 17 Nov 2015 | Premiered: 04 May 2015

Check Point Software Technologies Ltd.

7 Habits of Highly Effective Teams
sponsored by IBM
WEBCAST: Consult this informative video to learn more about the widespread adoption of "going agile." Find out how you can obtain shorter release cycles, greater flexibility and tighter alignment by going agile. It explores the broad technical, organizational and process changes that can help your team transition to an agile environment.
Posted: 22 Apr 2013 | Premiered: Apr 22, 2013


Measuring Software Quality: Why Your Metrics Don't Make the Grade
sponsored by IBM
WEBCAST: What keeps your customers happy when it comes to software? Tune into this video to learn more about what you can do to improve your software  testing and quality assurance. It outlines the pros and cons of satisfied customers and what the means for your business. View this resource now to learn more about improving your software.
Posted: 23 Apr 2013 | Premiered: Apr 23, 2013


The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

HID Global's ActivID® Authentication: Online Banking
sponsored by HID
WEBCAST: This short webcast highlights an authentication system with SMS ID verification and cloud-based threat detection offerings. Learn how services such as online banking can truly benefit from this system to ensure secure access to user accounts.
Posted: 15 Nov 2013 | Premiered: Nov 15, 2013


Strategies to Survive Software Asset Management Audits
sponsored by CDW Corporation
WEBCAST: This exclusive webcast can help you prepare for an audit by covering some software asset management (SAM) strategies and tactics you should adopt to get ready for a software audit.
Posted: 28 Feb 2014 | Premiered: Feb 27, 2014

CDW Corporation

Enhancing Security with Intel® Trusted Execution Technology
sponsored by Dell, Inc. and Intel®
VIDEO: This video explains – in less than five minutes – how to enhance security with Intel Trusted Execution Technology (TXT). View now to learn more about this hardware-based security solution that can help you boost platform security, support compliance, protect virtualized data centers' clouds, and more!
Posted: 29 Aug 2013 | Premiered: 29 Aug 2013

Dell, Inc. and Intel®
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement