Blogs

View All RSS Feed

Last Updated on 17 Dec. 2014, Total: 1192 Blog Posts

588 George Chetcuti’s Blog 17 Dec. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. TransVault Compliance TimeMachine

    TransVault Creates Compliance TimeMachine for Email Records Moved into Office 365... Read More

  2. LANDESK Acquires Naurtech

    Although Naurtech will be part of the larger LANDESK business, its product offerings will be maintained separately... Read More

  3. Consumers will do anything for Free Wi-Fi

    In a Europol-supported investigation, researchers found consumers recklessly exposing their personal details via public wi-fi and carelessly agreeing to outlandish terms and conditions... Read More

  4. October Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

  5. Citrix Acquires Virtual

    According to Citrix advances in App Development and Test Virtualization increase Security, Scalability, Testability and Manageability of Mobile Apps... Read More

  6. Firebrand names latest winner of Free Training for Life

    Firebrand Training is delighted to announce the second winner of the Free Training for Life (FTFL) competition. A prize estimated to be worth over £1 million*... Read More

  7. Bash vulnerability - the original fix for this issue was incorrect

    The original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix... Read More

  8. Latest release of Whonix

    Whonix Anonymous Operating System Version 9 Released - Whonix is an operating system focused on anonymity, privacy and security. It’s based on the Tor anonymity network, Debian GNU/Linux and security by isolation... Read More

  9. What is PoS malware?

    PoS terminals are among the most vulnerable spots in retailers’ infrastructure for a number of technical reasons... Read More

  10. Card Skimming Prevention

    Skimming is the unauthorized capture and transfer of payment data to another source... Read More

Featured Links