Blogs

View All RSS Feed

Last Updated on 11 Feb. 2016, Total: 1370 Blog Posts

764 George Chetcuti’s Blog
606 Windows Networking Admin Blog
  1. Seagate and Samsung combined strength!

    Seagate claims that its acquisition of Samsung's hard drive business will allow them to offer a more extensive portfolio of innovative storage solutions. The acquisition was completed on December 19th, 2011 and the deal includes assets, infrastructure and employees. Also, Seagate will supply disk drives to Samsung for PCs, notebooks and consumer devices while, Samsung will supply Seagate with chips... Read More

  2. Seagate's 2TB external hard drive now backs up your phone

    Seagate announces its second generation external storage drive that backs up your iOS or Android mobile device... Read More

  3. Seagate: Lock It Up With Maxtor® BlackArmor™, Hardware Encrypted Storage Provides Government Grade Security for Consumers

    LAS VEGAS-January 6, 2008-Extending its lead in providing solutions to protect business and personal data from loss or theft, Seagate Technology (NYSE: STX) today introduced at CES, the Maxtor® BlackArmor™ encrypting storage solution that provides AES government-grade encryption protection against unauthorized access to valuable and private information. The Maxtor BlackArmor solution is a 160GB portable storage device that delivers the... Read More

  4. Season’s Greetings

    In warm appreciation for your viewership during the past year, we extend our very best wishes for a happy holiday season... Read More

  5. Secret questions are insecure and easily forgotten

    Secrets, Lies, and Account Recovery: Lessons from the Use of Personal Knowledge Questions at Google... Read More

  6. Secunia Advisory: CA BrightStor ARCserve Backup RPC Server Denial of Service

    Description:M. Shirk has discovered a vulnerability in CA BrightStor ARCserve Backup, which can be exploited by malicious people to cause a DoS (Denial of Service).The vulnerability is caused due to a NULL pointer dereference error when handling TADDR2UADDR (0x08) request types within the CA Remote Procedure Call Server service (CATIRPC.EXE). This can be exploited to crash the service by sending... Read More

  7. Security Concerns and Lack of Visibility Hinder Cloud Adoption, Say 65% of IT Pros

    Netwrix 2015 Cloud Security Survey reveals unauthorized access and account hijacking are the leading security risks associated with the cloud... Read More

  8. Security Logging in an Enterprise

    The logging diverging requirements, along with resource contention, make it worthwhile to consider a separate high-integrity data store for sole use of Computer Incident Response Teams... Read More

  9. Security Predictions 2015: New Challenges and Risk Mitigation Drive Changes to IT Security

    Netwrix shares top security trends that will drive information technology in 2015... Read More

  10. Security Professionals Nightmare

    Although, the virus Flame is no longer spreading and most of its command-and control servers discovered, it remains what security professionals have been terrified of - mimicking Microsoft's Windows update mechanism and spreading through it. Mikko Hypponen, chief research officer at F-Secure states that 'Having a Microsoft code signing certificate is the Holy Grail of malware writers. This has now... Read More

Featured Links