• Tor anonymity called into question as alternative browser surfaces

    News roundup: New threats add to the Tor anonymity debate as a new browser aims to take anonymous browsing to the next level. Plus: Android security outlook bad -- or is it?; another Xen host escape flaw; Wassenaar revisions put on hold.

    SharonShea470 pointsBadges:
  • How to estimate the lifespan of LTO tapes

    This tip outlines what you need to consider when estimating the lifespan of LTO tape. It's not as black and white as LTO tape manufacturers would like you to believe.

    searchStorage9,330 pointsBadges:
  • Best of VMworld 2015 Awards: Nomination form

    Nominate the top virtualization, cloud and end-user computing products for the 2015 Best of VMworld Awards.

    Nick Martin865 pointsBadges:
  • Google pledges security training for 10,000 UK internet users

    Google will host free workshops in five UK cities and 30 schools on safeguarding passwords, updating account settings, finding stolen devices and checking where data is being shared

    WAshford3,385 pointsBadges:
  • VPN security: testing, troubleshooting and deploying

    In this section of our network access learning guide, learn how to test VPN security, troubleshoot VPN flaws and vulnerabilities as well as learn about VPN alternatives.

    ITKE364,180 pointsBadges:
  • The benefits of dual-mode fixed mobile convergence

    Dual-mode fixed mobile convergence (FMC) solutions promise to reduce voice communication costs and improve employee productivity. But enterprises have yet to deploy them widely. This article analyzes the potential benefits of dual-mode FMC solutions.

    SearchMobileComputing405 pointsBadges:
  • session ID

    A session ID is a unique number that a Web site's server assigns to identify a specific user for the duration of that user's visit (session)...

    ITKE364,180 pointsBadges:
  • Open SSIS packages without validation using these SQL properties

    When opening a SQL Server Integration Services (SSIS) package in SSIS Designer, by default SSIS validates data sources used by the various components. You can choose to override this behavior -- primarily for time-saving purposes -- with two workarounds. SQL Server expert Robert Sheldon explains...

    contact1895 pointsBadges:
  • buffer overflow

    A buffer overflow occurs when a program or process tries to store more data in a buffer (temporary data storage area) than it was intended to hold.

    ITKE364,180 pointsBadges:
  • A top e-commerce strategy seen as ticket to strong sales

    Analysts provide tips on strengthening e-commerce strategies.

    SueHildreth430 pointsBadges:

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.