Join us on May 2nd, as we discuss preparing for DDoS attacks, building resiliency, overcoming obstacles and key preparations to make now before ransomware attacks.
Previous versions of the Apple iMac G5 were alternately lauded for their thin form factor and bemoaned for their propensity for overheating. I don't know whether the problems have been fixed, but the new iMac G5s look sweet. The biggest change in...
Last week, the Ubunto team released Ubuntu Linux 5.10, the latest version of its Linux distribution for desktops and servers. Ubuntu Linux 5.10 adds deeply integrated thin-client technology (making the distribution friendlier to educational...
The Mozilla Firefox Web browser is vulnerable to Denial of Service (DoS) attacks, which can occur because of malformed HTML tags or specific coding of IFRAME tags. The first DoS condition occurs when a "link" tag for a stylesheet contains an...
As ubiquitous as Telnet is, many security and IT administrators shun it because Telnet traffic passing between the client and server is unencrypted and visible to any network snooper who might be listening. Before you resort to cobbling together a...
I don't have enough systems to warrant setting up a Windows Server Update Services (WSUS) server to manage security updates; I just want all my computers to download updates from Microsoft's site as they're released. I'm comfortable with not...