Blogs

View All RSS Feed

Last Updated on 1 Oct. 2014, Total: 1157 Blog Posts

553 George Chetcuti’s Blog 1 Oct. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. Encrypting backups prior to sending to destination

    Bacula supports file encryption on the file daemon, which sends encrypted data to the storage daemon for storage... Read More

  2. Panasonic launches new 5“ handheld tablets

    A powerful all-in-one device for mobile workers combining the best of handheld, smartphone and tablet devices... Read More

  3. UK Cyber Security Challenge

    Cyber Security contains a diverse collection of disciplines across a broad spectrum of skills... Read More

  4. September Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. Encryption improvements for Microsoft Azure guest OS

    The encryption improvements, which apply to Microsoft Azure cipher solution for hosted guest virtual machines, provide customers with enhanced protection when connecting and transmitting data... Read More

  6. Email should receive the same privacy protection as paper letters

    Microsoft Chief Privacy Officer says, ‘Your email belongs to you, not us’... Read More

  7. A free and modern web-mail client with great features

    Mailpile is a modern, fast web-mail client with user-friendly encryption and privacy features... Read More

  8. Parallels launches Parallels Desktop 10 for Mac

    Parallels just released Parallels Desktop 10 for Mac and Parallels Desktop 10 for Mac Enterprise Edition, the industry-leading software for running Windows applications on Macs... Read More

  9. Avaya and HP to Deliver Expanded Communications Services to the Enterprise

    Companies to sell a combined portfolio of unified communications, contact center as a service, and infrastructure modernization services... Read More

  10. Handling malicious Internet route leaks – check list

    Anyone connecting to the Internet must have this contingency as part of their routing policy... Read More

Featured Links