Active Directory, AS/400, Business Intelligence, Career Development, CIO, Data Management, Database, DataCenter, Desktop Management, Development, Hardware, IBM DB2, IBM iSeries, IT Strategy, Linux, Lotus Domino, Lotus Notes, Management, Marketing, Microsoft Access, Microsoft Excel, Microsoft Exchange, Microsoft Exchange 2003, Microsoft Exchange 2007, Microsoft Outlook, Microsoft Outlook 2003, Microsoft Outlook 2007, Microsoft Windows, Microsoft Windows 7, Microsoft Windows Server 2003, Microsoft Windows XP, Mobile, Oracle, OS, Routers, RPG, RPGLE, SAP, Security, Servers, SQL, SQL Server, SQL Server 2005, Storage, Virtualization, Visual Basic, VoIP, VPN, Windows Server, Windows Server 2008 ...VIEW ALL TAGS
- Business Intelligence
- Career Development
- Cloud Computing
- Content Management
- Data Management
- Desktop Management
- Email Administration
- IT Strategy
- Lotus Domino
- Microsoft Exchange
- Microsoft Windows
News that some Dell laptops are shipping with at least one, and possibly two, rogue root certificates represents a potential security breakdown in production processes, say security experts
Amazon Web Services purports its s2n TLS protocol creation is simpler, easier to manage and more secure than standard TLS. Expert Dan Sullivan explains.
A buffer overflow attack occurs when a programming flaw allows an attacker to disrupt the integrity of a computer by sending an email message.
Malware, short for malicious software, is intended to gain access to or harm a computer. Attackers distribute various types of malware via email attachments that deliver viruses, worms, rootkits, Trojans, keyloggers, spyware and adware.
A form of fraud, phishing occurs when an attacker tries to learn information, such as login credentials or account information, by impersonating a reputable individual via email.
Nearly two-thirds of UK consumers would stop using a website hit by a breach, but nearly a quarter would not, a survey shows
Performance Testing on Cloud has an undisputable competitive advantage and like any advantage has challenges, performance testing on cloud also comes with its own set of challenges.