• The Betrayal of Wikileaks 16 Oct. 2012 George Chetcuti

    Hacktivists group Anonymous state that they cannot support anymore what Wikileaks has become. Read some tweets exchange between Anonymous and Wikileaks here - https://twitter.com/wikileaks/status/256208465511452672 Read Anonymous Press Release here - http://www.anonpaste.me/anonpaste/index.php?f12864c4aaa27e05#b85melA+HwnJhvVZbw93iqqnrdHJLNEJURQgWJSkAhk=

  • Top-secret base revealed on Apple Maps 12 Oct. 2012 George Chetcuti

    'A top-secret base in Taiwan, revealed on Apple Maps. The Navy SEALs' rehearsal site for the Osama bin Laden raid, found on Bing. Once again, commercial satellites have snapped images of things that governments would rather hide from public view. And once again, those governments are finding that there's not much they can do once this sensitive imagery ends up online.' Read more here - http://www.wired.com/dangerroom/2012/10/apple-secret-site/

  • Creating an Office 365 Hybrid Deployment without a Lab Server 11 Oct. 2012 George Chetcuti

    Extract taken from September's MSExchange.org newsletter authored by Henrik Walther, MCM: Exchange Okay so there's quite a few of you that would like to test a migration from an on-premise Exchange environment to Office 365 in order to get some hands on experience prior to doing this as an administrator within your enterprise organization or maybe as a partner consultant that would like to provide this service to customers. You of course have the option of creating a couple of virtual machines on your laptop or workstation so that… Subscribe to msexchange.org monthly newsletter here - http://www.techgenix.com/newsletters-subscription.htm

  • Can we trust the Chinese with our critical data infrastructure? 10 Oct. 2012 George Chetcuti

    The Chinese world leader in fourth generation communication networks, known as 4G, sets its eye on the U.S market. This latest technology is used for high volumes of phone calls, data, and high definition video. Its innovative low cost systems have already captured markets in Africa, Latin America and Europe. Many U.S. congressional leaders and others see this move as a potential threat to U.S. critical data infrastructure. This could lead the Chinese government to exploit Huawei's presence on U.S. networks to intercept high level communications, gather intelligence, wage cyber war, and shut down or disrupt critical services in times of national emergency. Read more here - http://www.cbsnews.com/8301-18560_162-57527441/huawei-probed-for-security-espionage-risk/

  • Eulogy for TMG – Monthly Newsletter 24 Jan. 2013 George Chetcuti

    This year we celebrated the 15th birthday of Microsoft's proxy/firewall solution that has gone through a couple of name changes to get where it is today. Sadly, on September 12, Microsoft announced that the company is discontinuing TMG, along with FPE, FPSP, FSOCS and TMG Web Protection Services… Microsoft will continue to support the products through 2015, with extended support for TMG through 2020. In the months ahead, we'll be looking at what else is out there and how you can plan for a relatively painless transition when the time comes... Extract taken from September's ISAserver.org newsletter authored by Debra Littlejohn Shinder, MVP Subscribe to isaserver.org monthly newsletter here - http://www.techgenix.com/newsletters-subscription.htm

Show More