Blogs

View All RSS Feed

Last Updated on 26 Sept. 2014, Total: 1156 Blog Posts

552 George Chetcuti’s Blog 26 Sept. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  2. Latest release of Whonix

    Whonix Anonymous Operating System Version 9 Released - Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation... Read More

  3. What is PoS malware?

    PoS terminals are among the most vulnerable spots in retailers’ infrastructure for a number of technical reasons... Read More

  4. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

  5. Analysing TorrentLocker

    Security researchers from the Finnish consulting company Nixu, found a way how to get your files decrypted without paying the ransom resulting from a TorrentLocker infection... Read More

  6. Are your wireless printers accessible from the Internet?

    An information security company estimates there are at least 2000 vulnerable models connected directly to the internet... Read More

  7. MS Exchange CON 2014 Online Conference

    This online annual live conference is presented by MSExchange.org... Read More

  8. WordPress releases version 4.0 of its blogging platform

    Version 4.0 of WordPress, named “Benny” in honor of jazz clarinetist and bandleader Benny Goodman, is available for download or update in your WordPress dashboard... Read More

  9. Unitrends Introduces Free Backup Capacity and Storage Inventory Reporting Tools

    New tools enable systems admins to identify cost savings by calculating specific backup sizing requirements and eliminating extraneous storage... Read More

  10. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

Featured Links