Blogs

View All RSS Feed

Last Updated on 2 Sept. 2014, Total: 1145 Blog Posts

541 George Chetcuti’s Blog 2 Sept. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. Webmin contains a cross-site scripting vulnerability

    Webmin 1.670, and possibly earlier versions, contains a cross-site scripting vulnerability... Read More

  2. Websense seven security predictions for 2013

    Websense Security Labs, a global leader in unified web, data, and email content security has made its predictions for 2013. Websense report predicts the key threats that the IT technology will face in the coming year which can give you a head start in reviewing your current defenses, identifying security gaps and putting new safeguards in place. The report also... Read More

  3. Weekly updates for MS Web-based Services

    Microsoft has been moving toward more frequent updates with other programs, including Windows... Read More

  4. Western Digital: Huge 8 tb capacity, media streaming and performance enhancement added to wd® sharespace network storage systems for small offices and digital media enthusiasts

    LAS VEGAS - (PMA BOOTH NO. R260) -- Mar. 3, 2009 - WD® (NYSE: WDC), the world's leader in external storage solutions, today announced that WD ShareSpace™ network storage systems now offer 8 TB (terabytes) of capacity, up to 30 percent faster transfer speeds, and DLNA1 media streaming capabilities. Combined with its ease-of-use and small footprint, WD ShareSpace is now... Read More

  5. What Is the Windows Server "8" Beta Remote Access Server Role?

    Windows Server 8 new remote Access Server role combines the previous DirectAccess and RRAS roles into one unified service role. The new role allows for centralized administration, configuration, and monitoring of both DirectAccess and VPN-based remote access services. Apart, from the various articles and tech tips available at windowsnetworking.com and virtualizationadmin.com you can learn more about Remote Access in Windows... Read More

  6. What are some steps businesses should take to protect their data and reputation?

    Organizations most often overlook simple steps that would help them protect their data! A breach can cost a company monetary and reputation loses hence, companies should consider implementing controls that enhance cyber security. But what is the best approach to guard against cyber security risks? The Division of Corporation Finance, a part of the Securities and Exchange Commission, has issued... Read More

  7. What is Amazon’s Cloud Service Activate?

    AWS Activate is a package of resources for start-ups. It was designed to make it even easier for start-ups to get started and to quickly scale on AWS. It is an international program, with members from all over the world... Read More

  8. What is Passive DNS?

    Passive DNS or Passive DNS replication is a technique invented by Florian Weimer in 2004 where inter-server DNS messages are captured by sensors and forwarded to a collection point for analysis... Read More

  9. What kind of information does Microsoft provide to governments?

    Microsoft has several programs through which it disclose information regarding vulnerabilities, some of which have government participants... Read More

  10. What the users want, the users get: New My Opera Community site released

    Oslo, Norway - March 8, 2007 Today Opera Software unveiled its new and improved My Opera Community, an online oasis where users can blog, share photos, chat and make friends. My Opera is a free service that features a freshly re-designed user interface and is now specially optimized for surfing from not only the PC, but Wii, Opera Mini and... Read More

Featured Links