- Activism's slippery slope: Anonymous targets children's hospital
- New iPad rumor rollup for week ending April 23
- Apple users put at risk by 3-week delay between OS X and iOS patches, researchers say
- Tip of the Hat: Heartbleed prompts chastened tech giants to fund OpenSSL
- 'Francophoned' cybertheft operation reportedly back in action
FreeOTFE may sound like a political bumper sticker, but it stands for "Free On The Fly Encryption." The "Free" part is self-explanatory; "On The Fly Encryption" refers to the encrypting/decrypting of data as it is written to or read from your hard disk.
Network-attached storage (NAS) can make your business easier to run and more efficient in multiple ways.
Although live CDs have a lot of advantages, they don't fit in your pocket easily, which means you may not always have one around when you need it. Fortunately, most live CD images can be installed onto a USB flash drive, giving you most of the benefits of a live CD.
Last week I told you how to make a new computer hassle-free; to wit, I described how to create a system-repair disc, dump the junkware, and set up security. Now that you've got your PC just the way you want it, it's time to perform what I consider to be the ultimate hassle-prevention steps: imaging your hard drive and setting up a backup routine.
Peter's motherboard died. How can he retrieve the data on his hard drive?
Any business of any size runs on information, whether it's keeping track of accounting data or managing the flow of proposals and orders. Over the past 25 years, computers have transformed the way that small businesses operate, making it possible to organize and manage information in ways that simply was not possible in the days of paper ledgers and index cards.
Losing your laptop can be expensive in three ways. First, you'll spend hundreds or thousands of dollars to replace the hardware. Second, you'll suffer the time and aggravation of restoring your data, all the while hoping you have everything backed up properly. But most expensive? Surviving the backlash and legal consequences of losing customer data, financial records and private company information.
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- World Tech Update: On the road at the New York Auto Show
- Four growing European startups to keep an eye on
- Microsoft profit drops but devices, consumer products help results
- US tech spending to see 'solid, steady growth' this year and next, Forrester says
- Official urges state to adopt federal Obamacare site, rather than fix one Oracle built