?
Solved

MISC. SECURITY

Posted on 2014-01-31
1
Medium Priority
?
401 Views
Last Modified: 2014-02-05
can you please provide some good articles on folllowing

1) malware analysis tools
2) IDS. Host Intrusion sysytems
3) (DLP) Encryption Technology
4)ddOES Technologies
0
Comment
Question by:pramod1
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 29

Accepted Solution

by:
Thomas Zucker-Scharff earned 2000 total points
ID: 39824614
Try these:

http://www.experts-exchange.com/Software/Internet_Email/Anti-Virus/A_1995-CAN'T-RUN-EXES-IN-AN-INFECTED-SYSTEM.html 

and this (same article)

http://www.e-e.com/Software/Internet_Email/Anti-Virus/A_1995-CAN'T-RUN-EXES-IN-AN-INFECTED-SYSTEM.html

Also these:

Registry Cleaners - Good or harmful to your PC?
http://www.experts-exchange.com/A_7989.html

Windows XP/Vista Recovery - Desktop icons missing - Empty Programs files
http://www.experts-exchange.com/A_6209.html

Infected Router - Google Search Redirects Even on a Clean System  
http://www.experts-exchange.com/A_5327.html

Google Hijack" - Google Search Gets Redirected:        
http://www.experts-exchange.com/A_3299.html

HijackThis reports missing files on 64-bit Systems:    
http://www.experts-exchange.com/A_3178.html

HijackThis - Some Tips & Tricks:                        
http://www.experts-exchange.com/A_2963.html

And finally this link to a search of Younghv's articles:

http://www.experts-exchange.com/memberArticleHistory.jsp?mid=3628488
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is written by John Gates, CISSP. Gates, the SNUG President-Elect, currently holds the position of Manager of Information Systems at Lake Park High School in Roselle, Illinois.
Ever wonder what it's like to get hit by ransomware? "Tom" gives you all the dirty details first-hand – and conveys the hard lessons his company learned in the aftermath.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
This video Micro Tutorial shows how to password-protect PDF files with free software. Many software products can do this, such as Adobe Acrobat (but not Adobe Reader), Nuance PaperPort, and Nuance Power PDF, but they are not free products. This vide…

741 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question