Frontpage
Navigation
Advanced search
Search all the words
Search the exact phrase
Published
Any time
Last day
Last week
Last month
Last three months
Last year
Display per page
5 items
10 items
20 items
30 items
50 items
Search for "" returned 4561 matches
Bit by Bit
123rf_50225678_Clone-binary-reproducable_CsabaDeli_resized.png
Debian's reproducible builds project tries to meet strict security requirements for binary packages from its archives through the creation of bitwise identical binary packages.
Stop IT!
123rf_43565269_Halt-Stop-Police_IldarGaleev_resized.png
Watering hole and spear phishing targeted attacks offer the greatest rewards to cybercriminals. Here's how to protect your company from these types of attacks.
Danger Ahead
PO-23008-123RF-Andrea_Danti_123RF-Periskop_resized.png
Simple backup strategies cannot protect files encrypted by ransomware, because they can be affected as well. A PowerShell script can ensure that your files are okay before sending them to backup.
Tunnel Constructor
fckncg_123RF-Tunnel.png
Smartphones and tablets using hotspots and mobile data connections are susceptible to spying. iOS and Android each supply a tunneled VPN connection out of the box. We take a look at their apps, as well as third-party apps to see if they offer more.
On the DVD
The server install image lets you install Ubuntu permanently on a computer as a server, with no graphical user interface. The GParted Live image provides access to the GParted graphical partition editor, a tool for managing disk partitions.
Welcome
Umbrella_RanczAndrei.png
I attended a security seminar a few weeks ago, and one of the slides read, "Security is not an IT problem." I laughed when I saw it and gave a smirk to our Security Manager at my new job.
Tech News
Windows_logo_CMYK.png
News for system administrators around the world.
Creative Security
PO-26394-123RF-Amy_Walters_123RF-8949433_-_miniature_military_soldiers_and_barbed_wire_are_guarding_a_laptop_from_viruses_spyware_and_identity_thie...
Much has happened in the field of SELinux in the last few years, including the development of new usability features. The current release makes it easier to write SELinux policy modules yourself.
High Demand
123rf_41718592_Computer-remote-control_scyther5_resized.png
The release of Windows Server 2016 also heralds a new version of Hyper-V, with improved cloud security, flexible virtual hardware, rolling upgrades of Hyper-V clusters, and production checkpoints.
New Variety
123rf_63066649_Sunflower-New-Variety_NataliaLukiyanova_resized.png
Free software alternatives to common commercial Windows programs often are little understood. We show which applications on the Linux desktop give an especially good account of themselves.
« Previous
Next »
1
...
353
354
355
356
357
358
359
360
361
362
363
364
365
366
...
457