General

Last Updated on 3 April 2014, Total: 148 Blog Posts

  1. Appropriate security measures for smart grids

    The proposed security measures are organized into three sophistication levels and ten domains... Read More

  2. Amazon launches a new set of high storage instances

    The High Storage Eight Extra Large instances are intended for applications that require high storage depth and high sequential I/O performance... Read More

  3. A Merry Christmas to all!

    The WindowsNetworking.com team would like to wish you a merry Christmas and a happy New Year!... Read More

  4. Microsoft security updates for December 2012

    As part of Microsoft's routine monthly security update cycle, 7 new security updates were released on December 11, 2012. If you happen to perform a manual update of the latest security updates then I suggest visiting Microsoft's Safety & Security Centre at the link below and reviewing each and every update available for download. For instance, a critical update for... Read More

  5. Phishing scam aimed at Facebook users

    A fake social media application aimed at Facebook users enticed users to enter their login credentials to gain access to the fake security app which promotes the security of their Facebook accounts and prevent them from being hacked. Users are reminded to never provide personal information such as, login credentials to unknown and unverified pop-up pages/screens, third-party apps, email requests,... Read More

  6. Windows Live Mesh will be retired on February 13

    After February 13, users of Windows Live Mesh would not be able to perform remote desktop and peer-to-peer activities. "Mesh synced storage" or "SkyDrive synced storage," will no longer be available through Mesh or devices.live.com, but copies of files on the local computer will remain unaffected. Microsoft recommends users to save all their cloud-based files to their local computers. However,... Read More

  7. “Smart defense” approach

    Here are some rules of thumb for Strategic Cyber Warning that were extracted form a paper prepared by the Smarter Alliance Initiative which is a partnership between the Atlantic Council and IBM. The key points are: Strategic disruptive effects are incredibly difficult, far harder than are usually thought. No known attacks have been both widespread and persistent enough to have... Read More

  8. Cyber Security in the UK!

    According to Nick Hopkinson, the former head of GCHG and CESG, UK is lagging behind the US, Germany and France in its ability to respond to cyber-attacks. This is due to a "lack of cohesion" between the various organizations set up to work towards the national cyber security strategy. But according to UK's Cabinet Office one year after the Strategy... Read More

  9. Latest TMG and UAG tech feeds

    Microsoft Forefront UAG - Configuring Forefront UAG as a DirectAccess Server (Part 2) In this article the author explains how to configure Forefront UAG as a DirectAccess Server. Comprehensive Overview of Web and Server Publishing Rules in TMG 2010 (Part 10) In this article we take a look at the details of the Server Publishing Rule we created and find... Read More

  10. Last chance to sign up to the Spear Phishing: The Cost of Damages and How to Create the ROI Case for Bolstering your Defenses webinar!

    Spear phishing has quickly evolved into one of the dangerous forms of spam. Phishing emails, designed to steal passwords, banking info, and other sensitive information, have become very common and very costly. Many IT and Security professionals know they need to bolster their defenses but are having trouble justifying new investments internally with a good ROI case. Join Michael Osterman... Read More

Featured Links