View All RSS Feed

Last Updated on 24 Nov. 2015, Total: 1359 Blog Posts

754 George Chetcuti’s Blog
605 Windows Networking Admin Blog
  1. Desktop Authority 7.5 now available

    ScriptLogic today released Desktop Authority 7.5 with features to give you greater control over data security, desktop configurations and software management than ever before. Version 7.5 introduces USB and Port Security, an optional feature which locks down a desktop or notebook computer and prevents data theft using removable storage devices such as USB sticks, MP3 players or even recordable CD/DVDs... Read More

  2. "Body recognition" compares with fingerprint ID

    A range of human anatomical features and body measurements can help to identify a person, such as from closed circuit television (CCTV) security videos, no matter what clothing the person may be wearing... Read More

  3. "World's Fastest Storage" enables InfiniBand SANs.

    Texas Memory Systems, makers of the World's Fastest Storage®, today announced the availability of the first solid state disks with InfiniBand connectivity. The RamSan solid state disk is uniquely able to complement the low latency and high bandwidth of the InfiniBand interface. High performance computing environments can utilize solid state disks to accelerate metadata for large file systems, accelerate scratch... Read More

  4. 1,100 trillion calculations per second supercomputer

    Gaea, Mother Earth supercomputer is being upgraded to a 1,100 trillion calculations per second beast. The climate research supercomputer at Oak Ridge National Laboratory simulates complex climate conditions and performs intensive research. Gaea is a high-performance supercomputer which produces massive heat however, the technology behind its cooling mechanism compensates well for this. Read more - Read More

  5. 1.32 million Facebook user accounts exposed

    A Facebook flaw has made some 1.32 million user accounts accessible without using a password. A message posted to a hacker news website published a list of links that gives access to user accounts while bypassing password protections! Read more here - Read More

  6. 10 BYOD Policy Guidelines

    The following article by Kenneth Hess lists 10 BYOD policy guidelines that organizations can use as a starting point when managing security of users’ mobile devices connected to their networks... Read More

  7. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  8. 10 tips for cyber security

    The UK Federation for Small Businesses (FSB) published a report about cyber security best practices focusing on small and micro businesses... Read More

  9. 16 million mobile devices are estimated to be infected by malware

    The “Motive Security Labs H2 2014 Malware Report” examines general trends and statistics for malware infections in devices connected through mobile and fixed networks... Read More

  10. 16-bit legacy applications & Windows XP Mode

    Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More

Featured Links