Main Nav

Oct 12th, 2006
8:10 AM - 9:00 AM
Ballroom A-Three
Mountain Time
Session Type: Track 6
IRC "bots," Trojan horses, rootkits, "zero day" threats, compromised PCs . . . sound familiar? These threats can result in sensitive data exposures, not to mention the hassles of remediating compromised systems. We will discuss how to implement effective solutions and practices and a distributed management strategy to prevent exploits, IRC bot attacks, and unauthorized access.