IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization's attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.
Written by By Lior Div, Co-founder and CEO, Cybereason •
06 June 15 00:37
Once you've configured a Docker container, you'll probably want to see how it's configured. In this video excerpt from the Pearson/Addison-Wesley training course <a href="http://www.informit.com/store/docker-containers-livelessons-9780134096131">"Docker Containers LiveLessons"</a>, Christopher Negus will show you how to use commands such as
Written by By Christopher Negus •
05 June 15 19:58
Managing modern networked systems and applications is daunting because infrastructure is complex and things can go wrong in so many parts of the technology stack -- servers, storage, network devices, applications, hypervisors, APIs, DNS, etc. How can you address the challenge?
Written by By Ernest Mueller, APM Product Manager, Idera Software •
05 June 15 06:26
Want to see Windows 10's log of your I/O usage -- the Data Usage app in Settings -- by simply clicking or tapping on the Desktop? Enable or disable your microphone with two clicks? Turn off your webcam? Manage your Wi-Fi settings? It's easy.
Security orchestration methods and of course SDN is driving the need for programmable interfaces in security products. The Cisco ASA Firewall added a REST API back in December with the 9.3(2) code release. I've asked Mason Harris, from Cisco, to write up a quick how-to primer on the ASA API capabilities. Thank you Mason for the great information.
Android 5.0 Lollipop has been heralded as the operating system's biggest step forward to date. Improved battery life and performance through changes to Android's core runtime and power management systems are among the most anticipated enhancements among users, given their promise of a faster, more efficient experience."
Many women gamers and developers, as well as those who support them, havelately come under attack from online trolls. A common intimidation tactic that trolls use is "doxxing," or publicly exposing their targets' personal details, including home address, phone number and even financial records.
Everyone wants faster database queries, and both SQL developers and DBAs can turn to many time-tested methods to achieve that goal. Unfortunately, no single method is foolproof or ironclad. But even if there is no right answer to tuning every query, there are plenty of proven do's and don'ts to help light the way. While some are RDBMS-specific, most of these tips apply to any relational database.
For a project I was recently working on I needed to remove the white background from several hundred images in PNG format and replace it with transparency. I know you can automate Photoshop but that's like getting into a Sherman tank to go shopping at your local supermarket. Another constraint (other than my reluctance to wrangle Photoshop) was the need to be able to do this in the future as part of a process to be built into a virtual machine running Linux.
In the previous column on hacking PingPlotter I discussed how you can use the tool's Web interface and the curl utility to add targets to be tracked, for example, to add a single host you would enter the following on the command line:
The typical organization loses 5% of its revenues to fraud by its own employees each year, with most thefts committed by trusted employees in executive management, operations, accounting, sales, customer service or purchasing, according to the Association of Certified Fraud Examiners (ACFE). This type of malicious behavior by "privileged users" who have been given broad access to the company's computer assets has captured the attention of CIOs across the country.
If you work with data much, you don't need a statistical model to predict that the odds of consistently getting data in the format you need for analysis are pretty low. Those who do a great deal of data cleaning and reformatting often turn to scripting languages like Python or specialty tools such as OpenRefine or R.
Running late for a meet up with friends or an appointment? Share a location securely and for a limited time period with smartphone application Glympse. It's a free download for Android, iOS, Windows Phone and BlackBerry.
Google Earth users can do more than just fly around a virtual globe. The free mapping application can display real-time weather, help compose photographs and measure distances much more easily than its Maps cousin.
Copyright 2015 IDG Communications. ABN 14 001 592 650. All rights reserved.
Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.