Skip to main content

Home/ Groups/ Information Security
1More

AirMagnet - Enterprise Wireless Network Security and Troubleshooting - 0 views

  •  
    control over the entire lifecycle of the wireless LAN (WLAN) from network design and deployment to 24x7 intrusion prevention and troubleshooting. AirMagnet provides visibility into all aspects of your wireless airspace with the intelligence to automatically diagnose, explain and respond
2More

ISO27k infosec management standards - 0 views

  • ISO27k standards provide generally accepted good practice guidance on Information Security Management Systems to protect the confidentiality, integrity and availability of the information content and information systems
  •  
    iso27k iso27000
1More

U.S. Customs and Border Protection - Travel - 0 views

  • expedited travel to approved members between the U.S. and Mexico border.
1More

Cross often? Make it simple, use NEXUS - 0 views

  • NEXUS is designed to expedite the border clearance process for low risk, pre-approved travellers into Canada and the United States.
1More

GOES - Global Online Enrollment System - 0 views

  • Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs

Arrowlock - Home - 0 views

shared by Rich Hintz on 27 Oct 08 - Cached
2More

Laptops: How to Thief-Proof Your Laptop - 0 views

  • How to Thief-Proof Your Laptop
  •  
    PC World magazine rounds up eight tips to stop thieves from stealing your laptop
2More

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
2More

Download PDF Password Remover 3.0 Free Trial - The PDF Password Remover can be used to ... - 0 views

  • PDF Password Remover
  •  
    decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit encryption) are supported.
1More

Spot Messenger > Home - 0 views

  •  
    using the GPS satellite network to acquire its coordinates, and then sending its location - with a link to Google Maps™ - and a pre-programmed message via a commercial satellite network.
1More

Coordinated Russia vs Georgia cyber attack in progress | Zero Day | ZDNet.com - 0 views

  • Coordinated Russia vs Georgia cyber attack in progress
« First ‹ Previous 81 - 100 of 137 Next › Last »
Showing 20 items per page