Solved

MISC. SECURITY

Posted on 2014-01-31
1
398 Views
Last Modified: 2014-02-05
can you please provide some good articles on folllowing

1) malware analysis tools
2) IDS. Host Intrusion sysytems
3) (DLP) Encryption Technology
4)ddOES Technologies
0
Comment
Question by:pramod1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 26

Accepted Solution

by:
Thomas Zucker-Scharff earned 500 total points
ID: 39824614
Try these:

http://www.experts-exchange.com/Software/Internet_Email/Anti-Virus/A_1995-CAN'T-RUN-EXES-IN-AN-INFECTED-SYSTEM.html 

and this (same article)

http://www.e-e.com/Software/Internet_Email/Anti-Virus/A_1995-CAN'T-RUN-EXES-IN-AN-INFECTED-SYSTEM.html

Also these:

Registry Cleaners - Good or harmful to your PC?
http://www.experts-exchange.com/A_7989.html

Windows XP/Vista Recovery - Desktop icons missing - Empty Programs files
http://www.experts-exchange.com/A_6209.html

Infected Router - Google Search Redirects Even on a Clean System  
http://www.experts-exchange.com/A_5327.html

Google Hijack" - Google Search Gets Redirected:        
http://www.experts-exchange.com/A_3299.html

HijackThis reports missing files on 64-bit Systems:    
http://www.experts-exchange.com/A_3178.html

HijackThis - Some Tips & Tricks:                        
http://www.experts-exchange.com/A_2963.html

And finally this link to a search of Younghv's articles:

http://www.experts-exchange.com/memberArticleHistory.jsp?mid=3628488
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

There's a lot of hype surrounding blockchain technology. Here's how it works and some of the novel ways it' s now being used - including for data protection.
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Established in 1997, Technology Architects has become one of the most reputable technology solutions companies in the country. TA have been providing businesses with cost effective state-of-the-art solutions and unparalleled service that is designed…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question