Ten digital trends to watch out for in 2008 - - 0 views
ECM 2.0 - die Zukunft dokumentbezogener Technologien - 0 views
Ultimate Guide to Delicious Social Bookmarking - 0 views
-
I’ve pulled together a very comprehensive collection of tutorials, advice, resources, tips and tools to help you use Delicious to enhance your marketing, research and other business objectives. There’s a special section just for marketers.
Jean-Lou Dupont's WEBlog: Cloud Computing Mind Map - 0 views
-
Consider the metaplatform as suggested by Michael Mace - http://mobileopportunity.blogspot.com/2009/05/quick-history-of-software-platforms-how.html -
An interesting map, with an invitation to collaborate in its edition.
What are 2D Barcodes? - 0 views
-
History
-
2D Barcodes
-
Types of 2D Barcodes
- ...5 more annotations...
Adobe service puts browsers side by side - 0 views
How to Detect and Remove Stration Worm - 0 views
How to prevent yourself from email worms - 0 views
-
Antivirus software is simply not enough. An email worm can spread worldwide in just seconds, but it takes hours for antivirus vendors to analyze, create, and deploy signature updates. Fortunately, there are five easy steps you can take to help close that window of vulnerability and help keep email worms off your system.
Email Help Center - 0 views
-
Securing your mail client is just one of the lessons necessary to achieve optimum security against email threats. If you have not already done so, visit the Email Help Center for tips on spotting malicious attachments and the do's and dont's of email security. Merk W. from Denmark provides the following tips for securing Eudora:
Protect yourself from Email Worm Attack - 0 views
-
Breaking out simultaneously throughout the world on Sept/19/01, a mass-mailing email worm began actively launching a Distributed Denial of Service (DDoS) attack across the Internet. Dubbed W32/Nimda.a@mm by most antivirus vendors (the exception is McAfee who refers to it as W32/Minda@mm) the worm spreads itself via email, taking advantage of security vulnerabilities to automatically execute on the user's system.
Fizzer Worm Targets Email, KaZaA Users - 0 views
-
Discovered on May/08/03, Fizzer (a.k.a. W32/Fizzer@MM, W32/Fizzer.A, and Worm/Fizzu.A worm) spreads via email and the KaZaA P2P network. According to antivirus vendor F-Secure, Fizzer contains a built-in IRC backdoor, a DoS (Denial of Service) attack tool, a data stealing trojan, an HTTP server and autoupdating capabilities. The worm also has the ability to disable certain antivirus programs.
texts from last night - 0 views
full automatically retweeting at twitter | WebVoyager.net - 0 views
-
Many people ask how other twitter users can have so many updates a day. Do they have nothing else to do, only tweeting. In my article"Combine twitter, friendfeed, twitterfeed and RSS" I described how to bring your blog or webpage articles automatically in twitter. Today I will show how to automatically retweet articles.
« First
‹ Previous
2541 - 2560
Next ›
Last »
Showing 20▼ items per page

