General

Last Updated on 23 June 2014, Total: 152 Blog Posts

  1. Rights Protected Folder Explorer

    Rights Protected Folder Explorer is a Windows based application that allows you to work with Rights Protected Folders. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder. It works with Active Directory Rights Management... Read More

  2. 10 Common Mistakes of Incident Responders

    According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More

  3. Fake Skype malware app on Android

    Days after Trend Micro, a global leader in antivirus solutions broke the news of a fake Skype malware app for Android devices, Microsoft acknowledges the existence of the malware and releases an alert notification on its Malware Protection Center website. It urges users of Android phones to install security software or download the latest updates for those who already have... Read More

  4. Amazon’s RDS supports MS SQL Server Database Engine Tuning Advisor

    The Amazon Relational Database Service for SQL Server now supports the Microsoft SQL Server Database Engine Tuning Advisor. The Advisor will help you to select and create an optimal set of indexes, indexed views, and partitions even if you don't have an expert-level understanding of the structure of your database or the internals of SQL Server. Read more here -... Read More

  5. NASA’s Jet Propulsion Laboratory uses Amazon’s Simple Workflow Service

    NASA's Jet Propulsion Laboratory (JPL) uses Amazon Simple Workflow Service (SWF) as an integral part of several missions including the Mars Exploration Rover (MER) and Carbon in the Arctic Reservoir Vulnerability Experiment (CARVE). These missions continuously generate large volumes of data that must be processed, analyzed, and stored efficiently and reliably. Read more - http://aws.amazon.com/swf/testimonials/swfnasa/... Read More

  6. A Turing Machine built using LEGO

    To show everyone how simple a computer actually is and to honor Alan Turing, Jeroen van den Bos and Davy Landman built a simple LEGO Turing Machine. Their goal was to make every operation as visible as possible while using just a single LEGO MINDSTORMS NXT set. Read more here - http://www.legoturingmachine.org/... Read More

  7. EU lacks the tech workforce

    Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social... Read More

  8. System Update Readiness Tool for Windows 7and Windows Server 2008 R2

    Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008... Read More

  9. Be aware of fake Google’s Chrome installers for Windows

    Trend Micro, the antivirus vendor has identified suspicious URLs which appear to be hosted on legitimate sources such as, Facebook and Google domains that promote a malicious file called ChromeSetup.exe. This file has nothing to do with Google's Chrome installation but is simply an information-stealing Trojan application and is offered for download on various websites! An analysis of the file... Read More

  10. Submarine cables – Internet’s physical infrastructure

    If you're into the physical infrastructure of the Internet then this map should be your starting point. The Submarine Cable Map is a free resource from TeleGeography. Data contained in this map is drawn from Global Bandwidth Research Service and is updated on a regular basis. The map is rich of information including cable capacity, provider name and other elements;... Read More

Featured Links