Friday, August 10, 2007

[TechRepublic] Chapter Downloads: August 10, 2007

TechRepublic Chapter Downloads
Home | Downloads | Discussions | Tech Q&A | White Papers | Blogs | Newsletters


Aug. 22nd: Maximize your VPN investment with GoToMyPC Corporate

Join this live TechRepublic Webcast to learn how you can expand VPN service to a growing number of mobile users -- with no capital investment and very little IT support. (Sponsored by Citrix Online)


Use visualization software to analyze your network traffic and identify security vulnerabilities

Use visualization software to analyze your network traffic and identify security vulnerabilities Featured chapter download
Security Data Visualization creates graphical windows into the world of computer security data, revealing fascinating and useful insights into networking, cryptography and file structures. In this chapter download, learn how to use various visualization techniques to analyze live Internet traffic collected from a home ISP connection. Work through slices of the traffic based on port and protocol until you have examined all the packets. Learn what network attacks look like and how to assess your network for vulnerabilities with visualization software.

New chapter downloads

Secure your e-mail with OpenPGP Secure your e-mail with OpenPGP
While Pretty Good Privacy (PGP) usually works impressively to secure e-mail communications, but it isn't always easy to configure and can be very tricky to troubleshoot. In this chapter download from PGP & GPG: E-mail for the Practical Paranoid, learn how to use public keys, private keys, and digital signatures to calibrate your desired level of e-mail privacy in OpenPGP.

Something for nothing: Take a lighter look at spam scams Something for nothing: Take a lighter look at spam scams
The Spam Letters is a collection of entertaining and illuminating correspondence with the people who send out mass junk e-mailings (aka spam). Compiled from the nearly 200 entries written by Jonathan Land, The Spam Letters taunts, prods, and parodies the faceless salespeople in your inbox, giving you a chuckle at their expense. This chapter download from the book focuses on phishing scams.

Explore functional programming techniques in Ruby Explore functional programming techniques in Ruby
There may be no better way to learn how to program than by dissecting real, representative code samples. Accordingly, Ruby by Example analyzes a series of Ruby scripts, examining how the code works, explaining the concepts it illustrates, and showing how to modify it to suit your needs. In this chapter download, focus on learning some key functional programming techniques in Ruby.

Use the QtSql module to build Qt applications that work with various relational database management systems Use the QtSql module to build Qt applications that work with various relational database management systems
It's difficult to imagine many applications being able to function without relational databases to back them up. For this reason, Qt provides a range of classes in the QtSql module that work with various relational database management systems. Learn how to use the QtSql module to build Qt applications that work with different relational database management systems. Explore the structure of the QtSql module, selecting the appropriate driver, making a connection, making queries, transactions, embedded databases, using SQL model classes with Interview, and displaying query results.

 Automatically sign up for related TechRepublic newsletters:
Software Downloads at TechRepublic
TechRepublic Downloads Weekly Update
Photo Galleries at TechRepublic

Special feature: Microsoft Office

Perennial favorites

Cisco CCNA self-study: Fundamentals of IP
This chapter download presents the core concepts behind OSI Layer 3. This coverage includes IP addressing, IP routing, and some protocols useful to IP's effort to deliver packets end to end through a network.

Hacking Windows-specific services on Windows Server 2003
Learn how to fight common hacking methods, such as password guessing, eavesdropping on authentication, subverting authentication via rogue server or man-in-the-middle (MITM) attacks, and attacking vulnerabilities in Windows-specific services.

Save your sanity with these fixes for Windows XP multimedia annoyances
This chapter excerpt from Fixing Windows XP Annoyances: How to Fix the Most Annoying Things About the Windows OS shows you how to fix the most annoying multimedia problems; problems that are probably all too familiar to you.

Must-see Photo Galleries

Cracking open the D-Link DNS-323 NAS device
Looks like a toaster, stores like a NAS.

Solving Firefox's retention issues
How Mozilla is keeping its users interested.

Stylish new phones from Nokia
Angular works of art for the ear.

TechRepublic Today

Desktops NetNote
This newsletter will help you stay up to date on OS migration, PC troubleshooting, hardware needs analysis, and driver configuration. Click the "Sign Me Up" button to automatically subscribe.

About this newsletter You are receiving this newsletter at ngductien1.ndma@blogger.com as part of your TechRepublic membership.

Please add newsletters@techrepublic.online.com to your address book to ensure delivery of this newsletter.
Manage my Account Unsubscribe | Change my e-mail address | View my newsletters   Check out our Newsletter RSS feeds
Send Feedback Customer Service

If this newsletter was forwarded to you and you want to receive your own copy, please visit TechRepublic to sign up for a complimentary membership.
How to Advertise | Submit a Paper | FAQ | Privacy Policy

Copyright © 2007 CNET Networks, Inc. All rights reserved. TechRepublic is a registered trademark of CNET Networks, Inc.
CNET Networks, Inc.
235 Second Street
San Francisco, CA 94105
U.S.A.