Blogs

View All RSS Feed

Last Updated on 19 Dec. 2014, Total: 1193 Blog Posts

589 George Chetcuti’s Blog 19 Dec. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. Desktop Authority 7.5 now available

    ScriptLogic today released Desktop Authority 7.5 with features to give you greater control over data security, desktop configurations and software management than ever before. Version 7.5 introduces USB and Port Security, an optional feature which locks down a desktop or notebook computer and prevents data theft using removable storage devices such as USB sticks, MP3 players or even recordable CD/DVDs... Read More

  2. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  3. "World's Fastest Storage" enables InfiniBand SANs.

    Texas Memory Systems, makers of the World's Fastest Storage®, today announced the availability of the first solid state disks with InfiniBand connectivity. The RamSan solid state disk is uniquely able to complement the low latency and high bandwidth of the InfiniBand interface. High performance computing environments can utilize solid state disks to accelerate metadata for large file systems, accelerate scratch... Read More

  4. 1,100 trillion calculations per second supercomputer

    Gaea, Mother Earth supercomputer is being upgraded to a 1,100 trillion calculations per second beast. The climate research supercomputer at Oak Ridge National Laboratory simulates complex climate conditions and performs intensive research. Gaea is a high-performance supercomputer which produces massive heat however, the technology behind its cooling mechanism compensates well for this. Read more - http://www.knoxnews.com/news/2011/dec/29/huge-mother-earth-research-computer-loaded-with/... Read More

  5. 1.32 million Facebook user accounts exposed

    A Facebook flaw has made some 1.32 million user accounts accessible without using a password. A message posted to a hacker news website published a list of links that gives access to user accounts while bypassing password protections! Read more here - http://www.bbc.co.uk/news/technology-20180229... Read More

  6. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  7. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  8. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  9. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

  10. 2X Application Server tested.

    As soon as 2X announced their implementation of terminal services I was curious to try it out. So I grabbed the latest version of 2X ApplicationServer from the download site: http://downloads.2x.com/AppServer-LoadBalancer/2XAppServer-LoadBalancer.exe I decided to install ApplicationServer on a spare Windows 2003 Server virtual machine. Here is the list of steps performed to install ApplicationServer (by the way, I didn't read... Read More

Featured Links