A subnet allows the flow of network traffic between hosts to be segregated based on a network configuration. By organizing hosts into logical groups, subnetting can improve network security and ...
In the January 2011 Computer Power User magazine there is a review of a new Ubuntu derivative designed for novice computer users to run Linux on their desktop, Pinguy OS. The developer of this new ...
Here’s another great product that I learned about in TechMentor NYC. I wish I had it available to me at my last corporate position. Say you have a legacy piece of software that you would love to be ...
Jon Oltsik, is a former distinguished analyst and fellow at the Enterprise Strategy Group and the founder of its cybersecurity practice in 2003. Jon remains active in the cybersecurity community, ...
Firesheep moment for SCADA: Hacking critical infrastructure systems now as easy as pushing a button?
Remember Firesheep . . . the addon that was so easy to use that even the clueless could successfully hack Facebook and Twitter accounts via Wi-Fi? In some scarier than your average security news, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results