Blogs

View All RSS Feed

Last Updated on 1 Oct. 2014, Total: 1157 Blog Posts

553 George Chetcuti’s Blog 1 Oct. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. EFS is only as strong as your login password

    If you think that your sensitive and most important files are adequately protected when stored in an encrypted folder on your hard drive then you’re wrong!... Read More

  2. GFI Software Adds File Archiving and Increased Functionality through Outlook in GFI MailArchiver 2014

    Survey Data Shows More Work Than Ever Is Being Conducted Remotely. New File Archiving Feature Keeps Company Documents Safely Out of Public Clouds... Read More

  3. Unitrends Sets New Standard for Virtual Backup and Recovery

    Unitrends Virtual Backup 8.0 simplifies data protection for vSphere, XenServer and Hyper-V and boosts backup performance for half the TCO of competing products... Read More

  4. Microsoft acquires InMage

    InMage is an innovator in the emerging area of cloud-based business continuity... Read More

  5. Do you have an email archive migration strategy?

    "Migrating archives is not a trivial undertaking," reads an Osterman Research report on the subject... Read More

  6. CEE Storage Vendors Struggle with Major Economic Challenges in Q1 2014

    IDC's Disk Storage Systems Quarterly Tracker delivers timely intelligence and a comprehensive database detailing changes and trends in the storage market. The tracker enables users to view data by volume, value, terabytes, country, year, quarter, vendor, product brand, model name, product category, topology, installation, protocol, OS, redundancy, storage class, and price band... Read More

  7. Stealthy IM tool for absolute privacy

    Security experts have teamed up to make absolute privacy from mass surveillance the default practice... Read More

  8. Archive Migration Experts Help Remove Barriers to Cloud Adoption

    Latest product from TransVault lets organizations move legacy email into cloud at a lower price point... Read More

  9. Malicious Word documents & Associated Phishing campaign

    In this two-part series three security researchers present an analysis of a particular attack that combines spearphishing and exploit attempt... Read More

  10. July Newsletters Teaser

    Topics covered in CloudComputingAdmin.com, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowSecurity.com monthly newsletters... Read More

Featured Links