The Latest in IT Security

Posts Tagged ‘Blog’

14
Jun
2011

@RedNose commented on the blog I put up recently about the tool my Russian colleagues have made available for dumping TDL’s hidden file system: I’m going to respond here in case anyone else is confused about this.“I ran the tool and it did not show anything. Does it mean that TDSS is not present?”No, that’s […]

Read more ...

Remember that “fake cancellation message that gets reblogged to infinity and beyond” on Tumblr from a few weeks ago? It seems to have returned, and in a particularly glorious form: There will be no free giraffes. As with the last fake message doing the rounds, this one links to a Tumblr Japan disaster donation post. Clearly people […]

Read more ...


Categories

WEDNESDAY, MARCH 19, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments