Blogs

View All RSS Feed

Last Updated on 17 April 2015, Total: 1245 Blog Posts

641 George Chetcuti’s Blog 17 April 2015
604 Windows Networking Admin Blog 6 June 2014
  1. Monitor Your DNS for Hijacking

    Dnstest is a free tool that helps you monitor your DNS for Hijacking... Read More

  2. The KEMP Free LoadMaster

    Free LoadMaster is a new free product from KEMP Technologies... Read More

  3. Health Information at Serious Risk of Abuse

    Timothy Libert, a doctoral student at the University of Pennsylvania, demonstrates that data on online health information seeking is being collected by entities not subject to regulation oversight... Read More

  4. Gemalto presents the findings of its investigations

    Gemalto presents the findings of its investigations into the alleged hacking of SIM card encryption keys by Britain's Government Communications Headquarters (GCHQ) and the U.S. National Security Agency (NSA)... Read More

  5. Netwrix Freeware Helps to Prevent Inside Job

    Netwrix strengthens security and eliminates privilege abuse with reporting on who has access to what... Read More

  6. Preventing High Cost Security Breaches

    Join Brien Posey, Microsoft MVP, tomorrow, February 25th, at 12N EST | 11am CST | 9am PST | 5pm GMT for a discussion of the increasing trend of data breaches and real-life lessons learned by organizations, including recent examples such as the Anthem breach... Read More

  7. HTTP/2 Approved

    IESG has formally approved the HTTP/2 and HPACK specifications... Read More

  8. ManageEngine Rolls Out Office 365 License Management and Reporting

    ADManager Plus supports bulk edits of Office 365 user licenses, CSV-based bulk reassignments of Office 365 licenses; Exchange Reporter Plus reports on Office 365 mailbox size and inactive Office 365 mailboxes... Read More

  9. Last Chance to Register for the MSExchange.org Webinar: Advanced Exchange Backup and Recovery Strategies

    Despite the rise of other communications channels like social media, email and the messaging system remain the heartbeat of almost every organization today... Read More

  10. 16 million mobile devices are estimated to be infected by malware

    The “Motive Security Labs H2 2014 Malware Report” examines general trends and statistics for malware infections in devices connected through mobile and fixed networks... Read More

Featured Links