Expert analysis
A closer look at CleanMyMac
CleanMyMac (v1.9.5) is a cleaning tool for Macs that combines Universal Binaries slimming, removal of unneeded Languages, cleaning Logs and Caches, Quick and Secure erasing, …
A closer look at DropDMG
DropDMG (v3.0.6) is a piece of software that helps you create and work with Mac disk images – Apple’s preferred format for distributing Mac software and the only …
A closer look at NetWrix File Server Change Reporter
In order to cultivate a productive and fast-paced environment, most organizations don’t store their documents on local machines but instead rely on file servers for …
Network security blunders: Tales from the field
We’ve all made one in our career, I’m talking about that blunder you thought you would be fired for. My first blunder was rebooting all the campus router pairs at …
Hacking Unified Communications security
A fundamental shift in the IT security world has taken place. It is the common thread running through these real-world case studies: 1. An enterprise telecoms manager at a …
Application security vulnerabilities
Rafal Los, Application Security Evangelist at HP Software, talks about application security vulnerabilities at the logic level. The inner-workings of an application can only …
Feedback loops in the fight against spam
Nearly everybody gets spam. But do you ever wonder what happens when you click that ‘Report Spam’ button on your mail reader? Does it do anything useful, or is it …
A closer look at Disk Drill PRO
Disk Drill PRO (v1.2.97) is a Mac data recovery software that recovers data from HFS/HFS+, FAT, NTFS and other file systems. Disk Drill locates and recovers deleted files from …
The smartphone: A real bug in your bed
The rise of the smartphone over the past few years has been a technology success story. An almost perfect storm of advancing materials science, chip set development, software …
IPv6 reputation is doable
The Internet has grown beyond what anybody involved in its early development could have imagined. Who would have thought that a network developed in the 1970s for government …
Security auditing tools and challenges
James Tarala is a principal consultant with Enclave Security. He is a regular speaker and senior instructor with the SANS Institute as well as a courseware author and editor …
Web application security trends and issues
In this podcast, Mandeep Khera from Cenzic talks about web application security trends and issues. Web applications are the weakest link in the security chain – and it …