Blogs

View All RSS Feed

Last Updated on 20 Oct. 2014, Total: 1166 Blog Posts

562 George Chetcuti’s Blog 20 Oct. 2014
604 Windows Networking Admin Blog 6 June 2014
  1. Trend Micro purchased HijackThis

    Apparently trend Micro purchased Hijack This utility. Here is the post on the official HijackThis homepage from the developer: As some of you might have seen several IT news websites are offering Trend Micro HijackThis 2.00 beta. An official statement will be posted on their website soon, but since this is a public beta of theirs I figured it'd be... Read More

  2. Trend Micro: [Vulnerability Confirmation] Antivirus UPX Parsing Kernel Buffer Overflow Vulnerability

    Solution ID: 1034289A recent system upgrade added a '1' or '2' to old solution IDs. You find these solutions by removing or retaining the extra '1' or '2'. Product: Scan Engine - 8.300, Scan Engine - 8.000 Operating System: N/A Published: 2/6/07 5:18 AM Problem: Trend Micro has become aware of a vulnerability in its Scan Engine, wherein a corrupted... Read More

  3. Trend Micro: [Vulnerability Response] Buffer overflow in ServerProtect

    Solution ID: 1034290A recent system upgrade added a '1' or '2' to old solution IDs. You find these solutions by removing or retaining the extra '1' or '2'. Product: ServerProtect for Microsoft Windows - 5.58, ServerProtect for Network Appliance Filer - 5.61, ServerProtect for EMC Celerra - 5.58 Operating System: Windows 2000 Professional Edition - SP4, Windows 2000 Server -... Read More

  4. Trial run Windows Azure

    Are you an MSDN subscriber? I can imagine that most of you somehow are connected to MSDN and enjoy the benefits it offers, however, Microsoft are now offering free compute hours on their Windows Azure infrastructure if you are an MSDN Premium or Ultimate subscriber. Check with your manager or superiors your subscription level and take advantage of this offer... Read More

  5. Troubleshooting DNS using NMCap

    Network Monitor is a free tool available from Microsoft. You can capture data using either the graphical Network Monitor or the command-line NMCap tool. Analysis of the captured data must be done through the graphical interface. As network traffic is in abundance especially on busy servers, you would need to use filters to reduce the number of packets collected and... Read More

  6. Try Search Commands from Microsoft’s Office Labs

    Search Commands is an Office Labs experiment designed to quickly find the commands you need in Microsoft Office 2007 and 2010. It works with Word, Excel and PowerPoint only. Office Labs is a group within Microsoft and experiments with ideas by building prototypes to shape future research and development in the productivity space for both work and home. To install... Read More

  7. Try Visual Studio 2012 RC

    Visual Studio 2012 Release Candidate (RC) supports the new Windows 8 and Azure platforms with new tools that make HTML 5 and CSS 3 development more productive and higher quality end results. The development tool includes Windows Azure project templates and a whole slew of features for Windows 8 Metro and desktop applications. Download the Visual Studio 2012 Release Candidate... Read More

  8. Try Windows Intune for free!

    Try Microsoft cloud services with Windows Intune. Windows Intune helps you manage and secure personal computers and with the 30-day free trial you can use up to 25 computers. Windows Intune includes both the cloud service for PC management and security and upgrade rights to Windows 7 Enterprise and future versions of Windows. You can remotely perform a number of... Read More

  9. Two New Cisco Press Releases

    Cisco Expands Borderless Networks Portfolio With New Products Across Switching, Routing, Security and Mobility SAN JOSE, Calif. - October 5, 2010 - Cisco announced today new products and services across all the functional elements of its Borderless Network architecture - the switching, routing, security and wireless portfolios. Notable additions include the highest-performing and high-density Cisco® Catalyst® switch, Cisco Adaptive Security... Read More

  10. UK Cyber Security Challenge

    Cyber Security contains a diverse collection of disciplines across a broad spectrum of skills... Read More

Featured Links