Skip to main content

Home/ Affiliate Window | affiliatewindow/ Group items tagged hacker

Rss Feed Group items tagged

tech writer

Certified Ethical Hacker (CEH) v11 Training Course | IT Governance UK - 0 views

  •  
    Achieve Certified Ethical Hacker (CEH) v11. Build a career as a penetration tester. Learn attack strategies, tactics, tools, and countermeasures. Build your ethical hacking (penetration testing) career with the Certified Ethical Hacker (CEH) v11 qualification, recognized by employers worldwide. Learn the attack strategies, tactics, technology, tools, and motivations used by criminal hackers. Our Ely / Online course provides the flexibility of attending our certified COVID-19 secure training center or booking as an online delegate. Learn from anywhere with our Live Online and Self-Paced options that allow you to study your way, keeping travel and costs down to a minimum. Find out more. Successful completion of this five-day course and including the exam leads to the EC-Council CEH qualification and 35 CPD points.
tech writer

CEH Training Course & Practical Exam | IT Governance UK - 0 views

  •  
    Certified Ethical Hacker (CEH) Training Course and CEH Practical Exam: Get into the mindset of a criminal hacker with this five-day CEH training course. Learn from anywhere - choose whether you attend our courses Live Online or in person. Find out more. Our Classroom / Live Online option allows you to study your way, keeping travel and costs down to a minimum. This combination course will equip you with ethical hacking skills, and improve your knowledge of risks and vulnerabilities. Successful completion of the course and including exams leads to the internationally recognized Certified Ethical Hacker certification and CEH Practical, and 35 CPD/CPE points. The CEH exam voucher is included in the course, but the exam will need to be taken in your own time.
tech writer

Certified Ethical Hacker (CEH) Training | Learning Tree - 0 views

  •  
    Certified Ethical Hacker (CEH) Training | Learning Tree - In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic real-life scenarios.
tech writer

Certified Ethical Hacker (CEH) Practical Exam | IT Governance UK - 0 views

  •  
    Certified Ethical Hacker (CEH) Practical Exam: Fully accredited, a practical exam by the EC-Council. Adds value to your CEH certification by proving your ethical hacking skills and abilities. The exam can be taken from the comfort of your own home or office. Once you pass the exam, you will be certified as a CEH Practical.
tech writer

Avast Internet Security 2023 - 0 views

  •  
    Internet Security offers multiple layers of protection to keep you safe and your devices running smoothly. Each of the following advanced features is included in Internet Security software. Keep hackers on the other side of the wall with this essential security feature that monitors and controls incoming and outgoing traffic on your computer. Protect yourself from hackers who want to hijack your Domain Name System (DNS) settings, lure you to fake websites, and steal your banking details. WLAN Inspector automatically detects vulnerabilities in your private WLAN and uninvited guests who have gained access to your network. Detect and block viruses, malware, spyware, ransomware, and phishing. We use intelligent analysis to stop threats even before they can harm you. Detect and block suspicious behavior and provide zero-second protection against unknown threats and ransomware. Don't let ransomware and other untrusted apps modify, delete, or encrypt your photos and files.
tech writer

Certified Ethical Hacker (CEH) Self-Paced Online Training Course | IT Governance UK - 0 views

  •  
    Learn how to plan and perform ethical hacking (penetration testing) with this fully accredited distance learning training course. Achieve an industry-recognized EC-Council qualification in a time frame that suits you. Build your ethical hacking (penetration testing) career with the Certified Ethical Hacker (CEH) v11 qualification, recognized by employers worldwide. Pass the CEH exam the first time at a lower cost with this official EC-Council online course. Work at your own pace with self-paced online training, a more affordable, flexible, and less disruptive way to study. Find out more. Learn from anywhere with our Self-Paced, Classroom, and Live Online options that allow you to study your way, keeping travel and costs down to a minimum. Successful completion of the course and including the exam leads to the EC-Council CEH qualification and 35 CPD points.
tech writer

AVG File Server Business Edition - 0 views

  •  
    Security software for Windows servers to protect your small business. With AVG File Server Business Edition's network virus scanner, your customer and business data is safe from hacker attacks and malware, so you don't have to worry about it. Hackers and malware can significantly disrupt your operations and cost you time and money. And they can even cripple your entire business.
tech writer

Adaware Antivirus Professional - 0 views

  •  
    Adaware (formerly Lavasoft) has been a pioneer in the field of data protection and antispyware and has received numerous awards since 1999. Every Year, Adaware Antivirus is tested by independent labs and regularly achieves 99 percent protection against all forms of malware. This is why Adaware is considered one of the best and most stable antimalware programs on the market. Stops viruses, ransomware, spyware, and other types of malware. Scan all downloads before they have the potential to damage your computer. Block malicious processes and infected files in real-time. Unlimited technical support and service around the clock. Actively blocks malicious websites and online threats. Adaware antivirus pro offers a comprehensive defense against hackers, cyber threats, and malware. Our revolutionary threat detection is based on advanced anti-malware technology that detects all threats to your computer.
tech writer

Adaware Antivirus Total - 0 views

  •  
    Stops viruses, ransomware, spyware, and other types of malware. Scan all downloads before they have the potential to damage your computer. Block malicious processes and infected files in real-time. Unlimited technical support and service around the clock. PLUS! Protect confidential files with military-grade encryption. PLUS! Protect your children from content on the inappropriate Internet. Adaware antivirus provides a comprehensive defense against hackers, cyber threats, and malware. Our revolutionary threat detection is based on advanced anti-malware technology that detects all threats to your computer. Only in the Antivirus Total version: Give your computer complete protection with multiple layers of security, including antivirus, anti-spyware, firewall, anti-phishing, email protection, parental controls, and a privacy toolbox, that helps protect your confidential digital information
tech writer

Bitdefender Smart Home Cybersecurity | IOT Security Solutions for All Connected Devices - 0 views

  •  
    Secure all Internet-connected devices - even those without virus protection. Bitdefender blocks malware, password breaches, identity theft attempts, hacker attacks, and more. Protects printers, security cameras, baby monitors, smart assistants, gaming consoles, media players, and more.
tech writer

Avast Premium Security 2023 - 0 views

  •  
    In today's world, effective virus protection is especially important. Reports of hacker attacks are increasing, which requires special protection for sensitive data. Therefore, in order for personal data to be truly protected, every computer user should buy an antivirus for their system. The Avast Premium Security 2022 tool provides the appropriate protection for desktop PCs and mobile devices. Avast Premium Security - detects brute force attacks and prevents them in advance; - detects and fixes known security holes in the operating system; - directly blocks all IP addresses that exploit RDP ports to spread malware.
tech writer

Avast Antivirus Pro 2023 - 0 views

  •  
    Advantages of Avast Antivirus Pro 2022: Intelligent analysis detects and blocks viruses, malware, spyware, ransomware, and phishing. Protects you from zero-second threats and ransomware by detecting suspicious behavior patterns. Protects you from fake websites that steal your banking details and credentials. Test suspicious files in a safe environment before opening them on your computer. Automatically suspend notifications for an optimal gaming experience. Update your other software to fix vulnerabilities and improve performance. Send us a message directly from the product and we will get back to you as soon as possible. Automatically detects vulnerabilities in your private WLAN to keep hackers out.
tech writer

Penetration Testing Training | Penetration Testing Tools & Techniques | Learning Tree - 0 views

  •  
    Penetration Testing Training | Penetration Testing Tools & Techniques | Learning Tree - In this Penetration Testing course, you will learn to discover weaknesses in your own network by using the mindset and methods of a hacker.
tech writer

Sollensys | The Most Secure Online Blockchain Storage Services | sollensium - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

Sollensys - the first cybersecurity safety net built on the brilliance of blockchain te... - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

SMB-How it Works - Sollensys - 0 views

  •  
    Making the World Safer, One Block at a Time™ -- Sollensys allows you to archive any data or file type and securely recall a perfect copy of your unviewed, uncorrupted, and unchanged data from any browser. Even video, a first for blockchain technology! In a time when cybercriminals run rampant, attacking companies and individuals alike, securing your critical data can feel like walking a cybersecurity tightrope. Sollensys created an unbreakable safety net that harnesses the power of double-blockchain technology to encrypt and scatter a secure, unchangeable copy of your data across thousands of servers that is virtually impossible for hackers to reassemble without a unique key identifier. This isn't a storage solution; this is an indestructible vault. Blockchain is a technology-centered concept of immutability, meaning it keeps data from being changed or corrupted. Blockchain is a superior method for storing, securing, and transferring data, which is why Sollensys uses a private version of it to protect your most important data. Sollensium is a private, double blockchain that allows you to upload, encrypt, secure, and safely recall any type of data, including video assets, which is a first for blockchain technology.
tech writer

Patchman Website Security from Webhosting UK - 0 views

  •  
    Protect your website from cybercriminals. With around 5% of websites falling victim every month, Patchman Website Security automatically removes vulnerabilities, kills malware, and offers peace. Cybercriminals frequently find vulnerabilities in CMS platforms like WordPress, Drupal, Magento, and Joomla as well as in their many plugins. While updates and patches remove these vulnerabilities, any delay in updating or patching leaves the website at risk of malware infection and hacking. It is estimated that at any one time, almost half of all CMS sites have outdated software that is vulnerable to a cyberattack. With around 5% of websites falling victim every month, Patchman offers the peace of mind that outdated CMS and plugins will be detected and patched automatically, malware will be discovered and removed and hackers will be blocked from gaining access to your site.
tech writer

Automated Security For Websites - Patchman Website Security - 0 views

  •  
    Protect your website from cybercriminals. With around 5% of websites falling victim every month, Patchman Website Security automatically removes vulnerabilities, kills malware, and offers peace. Cybercriminals frequently find vulnerabilities in CMS platforms like WordPress, Drupal, Magento, and Joomla as well as in their many plugins. While updates and patches remove these vulnerabilities, any delay in updating or patching leaves the website at risk of malware infection and hacking. It is estimated that at any one time, almost half of all CMS sites have outdated software that is vulnerable to a cyberattack. With around 5% of websites falling victim every month, Patchman offers the peace of mind that outdated CMS and plugins will be detected and patched automatically, malware will be discovered and removed and hackers will be blocked from gaining access to your site.
tech writer

Avast SecureLine VPN - 0 views

  •  
    In addition to the complete anonymity of online activities, the networks also offer protection against hacker attacks in public WLAN networks. AVAST VPN products such as the AVAST SecureLine VPN are ideal for absolute protection and completely anonymous surfing. The AVAST SecureLine VPN provides a guaranteed encrypted connection between two networks. All files uploaded and downloaded to the Internet are fully protected and cannot be viewed by third parties. The AVAST VPN encrypts the user's IP address and prevents it from being traced. Anyone who places great value on complete anonymity on the net should buy a VPN as a matter of principle.
tech writer

Avast Essential Business Security - 0 views

  •  
    Avast Essential Business Security schützt Ihr Unternehmen vor Viren, Ransomware, Spyware, Zero-Second-Bedrohungen, Schwachstellen im Wi-Fi-Netzwerk und mehr. Schutz der Geräte. Egal, wo sich Ihre Mitarbeiter aufhalten und was sie online tun, Avast Essential Business Security sorgt für die Sicherheit Ihrer Geräte. Die preisgekrönte Technologie von Avast blockiert gefährliche Websites, stellt sicher, dass alle Dateien und E-Mails frei von Malware sind, verhindert, dass Hacker auf Ihr Gerät zugreifen, und vieles mehr. Datenschutz. Avast Essential Business Security schützt Ihr Unternehmen, Ihre Kunden und Ihre persönlichen Daten. Die Firewall- und Netzwerkinspektionstools von Avast blockieren Eindringversuche von Hackern und verhindern, dass sensible Daten die PCs Ihrer Mitarbeiter verlassen. Avast Software bietet umfassenden Schutz und zusätzliche Funktionen: Intelligenter Virenschutz: erkennt und blockiert Viren, Malware, Spyware, Ransomware und Phishing-Programme. CyberCapture: klassifiziert verdächtige Dateien und sendet sie bei Bedarf zur Analyse an ein Virenlabor. WLAN-Scanner: Spürt Schwachstellen im Netzwerk auf. Firewall: blockiert unzuverlässige Verbindungen. Web-Schutz: Blockiert verdächtige Websites E-Mail-Schutz: überprüft alle E-Mails auf Malware. Verhaltensschutz: Erkennt und blockiert verdächtiges Computerverhalten. Echte Website: Schützt vor Hackern, die Sie auf gefälschte Websites locken und Ihre Bankdaten stehlen wollen. Rettungstool: Erstellt ein sauberes Bootmedium mit einem Virenprüfprogramm, das Ihren Computer auf Dinge wie Rootkits untersucht.
1 - 20 of 26 Next ›
Showing 20 items per page