Rights Protected Folder Explorer is a Windows based application that allows you to work with Rights Protected Folders. By using Rights Protected Folder Explorer, you can securely store or send files to authorized users and control which users will be able to access those files while they are in the Rights Protected Folder. It works with Active Directory Rights Management... Read More
According to Michael Spohn of McAfee Foundstone Professional Services, the top 10 most common mistakes done by incident responders can be easily corrected. In fact, he compiled a list so that organizations can use it as a gauge of the effectiveness of their current incident response practices. Michael has vast experience in incident handling activities and he is a principal... Read More
Days after Trend Micro, a global leader in antivirus solutions broke the news of a fake Skype malware app for Android devices, Microsoft acknowledges the existence of the malware and releases an alert notification on its Malware Protection Center website. It urges users of Android phones to install security software or download the latest updates for those who already have... Read More
To show everyone how simple a computer actually is and to honor Alan Turing, Jeroen van den Bos and Davy Landman built a simple LEGO Turing Machine. Their goal was to make every operation as visible as possible while using just a single LEGO MINDSTORMS NXT set. Read more here - http://www.legoturingmachine.org/... Read More
Half of Europe's workforce is too tech-challenged to fill all the extra ICT jobs that will be knocking around in the next few years, according to the European Commission (EC). The EC's Digital Agenda crew released its scoreboard of how well the continent is doing. The overall aim of the EC Digital Agenda is to deliver sustainable economic and social... Read More
Check out this free tool provided by Microsoft which was released to fix an inconsistency in the Windows servicing store which may prevent the successful installation of future updates, service packs, and software. This tool checks your computer for such inconsistencies and tries to resolve issues if found. This tool is for Windows Vista, Windows Server 2008, Windows Server 2008... Read More
Consumers International, an independent global campaigning voice for consumers has published its fourth annual IP Watchlist. CI looks towards a future in which creators and consumers support each other in a mutually beneficial ecosystem of content production, consumption and reuse. The report also states that the recent discontent caused by ACTA and SOPA could have been avoided if government policy-makers... Read More
Although, 16-bit legacy applications may have become something of the past there are still instances of these applications which are considered as critical to some businesses. In fact, last week during a conference I met an IT Manager who said that they still use a 16-bit finance package which was developed for the specific needs of the organization. Although, the... Read More
Companies track their marketing campaigns in various ways like, in mass mailshots they add tracking images so that they would get more information about the users who have opened and read their marketing message. They collect users' information such as, IP addresses which help them determine the country, and client software which help them determine the type of operating system,... Read More
The U.S. Constitution prevents the government from performing searches without a valid reason; the government generally can't snoop through your laptop for no reason. Electronic data stored on personal devices is a reflection of our lives - family photos, medical documents, banking information, details about what websites we visit, and so much more. But those privacy protections don't safeguard travelers... Read More