Skip to main content

Home/ Groups/ Information Security
Rich Hintz

ISO27k infosec management standards - 0 views

  • ISO27k standards provide generally accepted good practice guidance on Information Security Management Systems to protect the confidentiality, integrity and availability of the information content and information systems
  •  
    iso27k iso27000
Rich Hintz

What a Botnet Looks Like - CSO Online - Security and Risk - 0 views

  • What a Botnet Looks Like
  •  
    Researcher David Vorel mapped interconnected, bot-infected IP addresses and created this geometric representation; CSO contributor Scott Berinato annotated the map and added interactive controls so you can zoom in and explore botnets' inner workings
Rich Hintz

GOES - Global Online Enrollment System - 0 views

  • Global Online Enrollment System allows registered users to enter their own applications for U.S. Customs and Border Protection (CBP) Trusted Traveler Programs
Rich Hintz

Cross often? Make it simple, use NEXUS - 0 views

  • NEXUS is designed to expedite the border clearance process for low risk, pre-approved travellers into Canada and the United States.
Rich Hintz

Spot Messenger > Home - 0 views

  •  
    using the GPS satellite network to acquire its coordinates, and then sending its location - with a link to Google Maps™ - and a pre-programmed message via a commercial satellite network.
Rich Hintz

Coordinated Russia vs Georgia cyber attack in progress | Zero Day | ZDNet.com - 0 views

  • Coordinated Russia vs Georgia cyber attack in progress
Rich Hintz

Arrowlock - Home - 0 views

shared by Rich Hintz on 27 Oct 08 - Cached
Rich Hintz

Download PDF Password Remover 3.0 Free Trial - The PDF Password Remover can be used to ... - 0 views

  • PDF Password Remover
  •  
    decrypt protected Adobe Acrobat PDF files, which have "owner" password set, preventing the file from editing (changing), printing, selecting text and graphics (and copying them into the Clipboard), or adding/changing annotations and form fields. Decryption is being done instantly. Decrypted file can be opened in any PDF viewer (e.g. Adobe Acrobat Reader) without any restrictions -- i.e. with edit/copy/print functions enabled. All versions of Adobe Acrobat (including 7.x, which features 128-bit encryption) are supported.
Rich Hintz

Laptops: How to Thief-Proof Your Laptop - 0 views

  • How to Thief-Proof Your Laptop
  •  
    PC World magazine rounds up eight tips to stop thieves from stealing your laptop
Rich Hintz

U.S. Customs and Border Protection - Travel - 0 views

  • expedited travel to approved members between the U.S. and Mexico border.
David Pan

Nipper - The Network Infrastructure Parser - 0 views

  •  
    对Cisco,Nokia,Juniper,CheckPoint,Nortel的配置文件进行安全审计。
« First ‹ Previous 81 - 100 of 135 Next › Last »
Showing 20 items per page