Remove cheat-sheets
article thumbnail

Data Management: A cheat sheet from TechRepublic

IG Guru

The post Data Management: A cheat sheet from TechRepublic appeared first on IG GURU. Big data is the backbone of modern business, but before it can be used, it has to be properly managed. Here's an overview of the ins and outs of data management.

article thumbnail

SharePoint Server 2010 Web Parts: Cheat Sheet

JKevinParker

After I posted the list of out-of-the-box Web parts for SharePoint Server 2010 , I created a two-page, downloadable cheat sheet. Download the free SharePoint Server 2010 Web Parts: Cheat Sheet in PDF format. Download the PDF document free below.

40
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Blue Team Cheat Sheets available via Dan Williams on LinkedIn

IG Guru

Check out the post here.

article thumbnail

Top 3 use cases to infuse AI in your business: A CxO cheat sheet

IBM Big Data Hub

Artificial Intelligence (AI) is no longer in its infancy; it is an essential business transformation tool to deliver results with impact.

article thumbnail

Security Vulnerability of Switzerland’s E-Voting System

Schneier on Security

This protection is implemented by special return codes (Prüfcode), printed on the sheet of paper you receive by physical mail. Your computer doesn’t know these codes, so even if it’s infected by malware, it can’t successfully cheat you as long as, you follow the protocol.

Paper 122
article thumbnail

REMnux Tools List for Malware Analysis

Lenny Zeltser

For another perspective on the REMnux tools you can use for examining malicious software, see the one-page REMnux Usage Tips cheat sheet. These will let you deobfuscate JavaScript and data, analyze websites, decompile executables, perform memory forensics, and more.

article thumbnail

How You Can Start Learning Malware Analysis

Lenny Zeltser

I listed some API calls worth considering in the Reverse-Engineering Malicious Code cheat sheet. You’ll also find my Analyzing Malicious Documents cheat sheet useful. This can bring you to the code worth examining, at which point you can begin figuring out the logic of the malicious assembly instructions.

Metadata 145