Blogs

View All RSS Feed

Last Updated on 17 April 2014, Total: 1082 Blog Posts

480 George Chetcuti’s Blog 17 April 2014
602 Windows Networking Admin Blog 20 March 2014
  1. More Than Half of IT Professionals Make Undocumented Changes to IT Systems - Netwrix Survey Finds

    Just 60% of Organizations have Change Management Controls in Place, Leaving 40% at Risk from Security Threats or System Downtime... Read More

  2. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

  3. PassiveDNS Tool

    PassiveDNS sniffs traffic from an interface or reads a pcap-file and outputs the DNS-server answers to a log file... Read More

  4. Free Cloud-based Vulnerability Scanner

    Tripwire SecureScan provides free vulnerability scanning for up to 100 IPs and includes comprehensive detection rules for Heartbleed to uncover the vulnerability wherever it may lie on your network... Read More

  5. Choosing a VDI solution?

    Citrix claims 4 reasons to go beyond VMware View using Citrix XenDesktop... Read More

  6. Microsoft Unveils Windows 8.1 Update

    Microsoft has just unveiled the Windows 8.1 Update at Build, and it will be rolling it out to users of the tiled operating system on April 8. MSDN subscribers can download it today... Read More

  7. Amazon AWS announces 12 new cloud computing instance types

    Amazon AWS adds support for 12 additional EC2 instance types... Read More

  8. April Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  9. Netwrix Combines IT with Neuroscience to Predict and Prevent Security and Compliance Incidents

    New Technology from Netwrix Captures Brain Activity via Bluetooth Radio and Predicts Actions of System Administrators before These Actions Happen... Read More

  10. How to Educate Employees on Cyber Security

    A robust Information Security policy and regular, mandatory training for all staff on information security is imperative... Read More

Featured Links