General

Last Updated on 28 July 2015, Total: 164 Blog Posts

  1. DDoS attack visualization

    VideoLAN developer Ludovic Fauvet turned a recent DDoS attack on VideoLAN's server into a Logstalgia video that shows an amazing, one-sided fight between thousands of requests, with the web server desperately trying to keep them all at bay... Read More

  2. May’s Newsletters Teaser

    Salient points from ISAserver.org, VirtualizationAdmin.com, MSExchange.org, WindowsNetworking.com and WindowsSecurity.com monthly newsletters... Read More

  3. MSExchange.org Webinar: The Hidden Costs of Email Management

    Join J. Peter Bruzzese, Microsoft Certified Trainer and CIO and CoFounder of ClipTraining on Wednesday, March 27, 2013 for a live MSExchange.org webinar, sponsored by Kroll Ontrack. In this complimentary 45 minute Webinar, you will discover:... Read More

  4. Unitrends Unveils Six Secrets Most Backup Vendors Don’t Want You to Know - Part 1

    Have you ever had the feeling that you were left in the dark on something while everyone around you was in the know?... Read More

  5. Monthly Newsletters Teaser

    Some salient points from our monthly newsletters... Read More

  6. Another APT Campaign discovered - OPERATION BEEBUS

    APTs focus on stealing personal/organizational sensitive information to achieve financial gain... Read More

  7. Microsoft's 128GB Surface Pro model already sold out

    Microsoft's Surface Pro puts the heat on!... Read More

  8. A 31-minute webinar about Social Media & Cloud Computing Threats to Privacy, Security and Liberty

    WHAT TO TEACH YOUR KIDS, EMPLOYEES AND INTERNS ABOUT SOCIAL MEDIA... Read More

  9. An Open, Safe and Secure Cyberspace

    To safeguard access and openness, to respect and protect fundamental rights online and to maintain the reliability and interoperability of the Internet... Read More

  10. Software Defined Networking

    The key characteristic of Software Defined Networking is the separation of the virtual network from the physical network, through a layer of software that hides the physical topology from the applications... Read More

Featured Links