Search Results

Search found 5533 results on 222 pages for 'child protection'.

Page 107/222 | < Previous Page | 103 104 105 106 107 108 109 110 111 112 113 114  | Next Page >

  • How to Configure Windows Defender

    The existence of spyware and other unwanted irritations on the Web is so widespread that keeping your PC protected is an absolute must. Microsoft responded to this need with the inclusion of its Windows Defender program with Windows 7. Windows Defender does exactly what its name suggests, which is to defend your PC from spyware and other malicious programs. It does this first with real-time protection that notifies you if any spyware tries to run on your computer or if a program tries to change any vital settings in Windows. Windows Defender also helps to keep your computer protected thro...

    Read the article

  • Le rachat de McAfee par Intel validé par la Commission européenne, sous réserve d'une garantie "d'interopérabilité des produits"

    Le rachat de McAfee par Intel validé par la Commission européenne, sous réserve d'une garantie de l'interopérabilité "des produits issus de cette concentration" Mise à jour du 28.01.2011 par Katleen Ca y est, la Commission européenne a finalement statué sur l'acquisition de McAfee par Intel, et a décide de l'autoriser, tout en y mettant des conditions. En effet, cette validation est « accordée sous réserve d'un ensemble d'engagements garantissant une concurrence équitable entre les parties et leurs concurrents dans le domaine de la sécurité informatique ». Intel a donc du s'engager a garantir que ses processeurs équipés des technologies de protection de McAfee seront compatib...

    Read the article

  • Private domain purchase with paypal: how to prevent fraud?

    - by whamsicore
    I am finally going to buy a domain I have been looking at. The domain owner wants me to give him my Godaddy account information and send him the payment via Paypal gift, so that there will be no extra charges. Should this cause suspicion? Does Paypal offer any kind of fraud protection? What is the best way to protect myself from fraud in this situation, without the need for escrow services, such as escrow.com? Any advice welcomed. Thanks.

    Read the article

  • How to protect Ubuntu from fork bomb

    - by dblang
    I heard someone talking about a fork bomb, I did some research and found some dreadful information about some strange looking characters people can have you type at the command line and as a result do bad things on the computer. I certainly would not issue commands I do not understand but one never knows what can happen. I heard that some OS allows the administrator to place some limit on user processes to mitigate the effects of fork bombs, is this protection in Ubuntu by default or would a person with sudo privilege have to set this? If so, how?

    Read the article

  • Google Apps for Business : Google propose la signature chiffrée des mails pour lutter contre les spams, en utilisant la norme DKIM

    Google Apps for Business : Google propose la signature chiffrée des mails Pour lutter contre les spams, en utilisant la norme DKIM Dans sa lutte contre le fléau des spams, Google vient d'ajouter un outil à ses Google Apps for Business, sa suite professionnelle d'applications Cloud. En plus de Postini, cette suite se dote aujourd'hui d'une technologie spécialement conçue pour contre-carrer les spams et autres phishing. Le principe repose sur une identification chiffrée de l'identité de l'expéditeur, qui s'authentifie alors comme « sûr ». Cette protection utilise sur une norme déjà existante appelée « DomainKeys Identified Mail » (DKIM). La nouveautés est son intégration aux Google ...

    Read the article

  • Backup and Recovery in Exadata environments

    - by Javier Puerta
    As with any infrastructure every Engineered Systems customer needs a Backup & Recovery solution for Data Protection. See a detailed presentation and learn about the challenges of backup & recovery and the key benefits of the ZFS Storage Applicance as a backup device for Exadata & Sparc SuperCluster. (You need to be a registered member of the Exadata Partner Community to access link above. Otherwise you will get an error. You can register here)

    Read the article

  • Why circles are not created if small?

    - by Suzan Cioc
    I have changed the scale to my own and now I cant create any object, including circle, if it is of the size which is normal for my scale. I am to create big object first and then modify it to smaller size. Looks like minimal size protection is set somewhere. Where? UPDATE While creating a circle, if I drag for 0.04m circle disappears after drag end. If I drag for 0.08m circle also disappears. If I drag for more than 0.1m, circle persists after drag end. How to set so that it persist after 0.01m too?

    Read the article

  • Windows Azure HPC Scheduler Architecture

    - by Churianov Roman
    So far I've found very little information on the scheduling policy, resource management policy of Azure HPC Scheduler. I would appreciate any kind of information regarding some of these questions: What scheduling policy does a Head Node use to scatter jobs to Compute Nodes? Does Azure Scheduler use prior information about the jobs (compute time, memory demands ...) ? If 'yes', how it gets this information? Does Azure Scheduler split a job into several parallel jobs on one Compute node? Does it have any protection from Compute Node failures? (what it does when a compute node stops responding) Does it support addition/subtraction of Compute nodes? Is it possible to cancel a job? P.S. I'm aware of the MSDN resource Windows Azure HPC Scheduler. I found only information of how to use this Scheduler but almost nothing about how it works inside.

    Read the article

  • Ubuntu will not start any more !!!!!!!! PLEASE HELP?

    - by mike
    I really need help , I left my computer downloading all the night and i did donwload 35 go of movies ( legal ....) , I restart the computed in the morning then i booted in my encrypted windows partition for my work. Surprise in the evening when i try to boot on linux again , then it doesnt start as it's telling me low graphic mode , and doesnt boot( happen when it's really full ) . Tryed in rescue and it's telling me i have 0 mo free. Tryed in shell comand sdo root rm - Some files IMPOSSIBLE . it's telling me that my files are only in read only file systems. I mouted my other hard drive in windows as well but there is a '' Write protection '' i can only read the files. Please let me know , what solution do i have ? Should i try live usb with ubuntu ? Thanks guys

    Read the article

  • Pillar Axiom OpenWorld Highlights

    - by uwes
    During the Storage General Session at Oracle OpenWorld Conference 2012 in San Francisco, the following Axiom-related announcements were made: Oracle Platinum Services for Axiom 600: Extending Oracle's Platinum Services to Axiom 600 as a standalone product –  the same level of service and support you get with Exadata – 24/7 fault monitoring, dedicated response and escalation management to meet enterprise-grade SLA’s, patch planning and management. Oracle Enterprise Manager Axiom Plug-in: Allowing DBA's to manage, maintain, monitor and provision the Axiom 600 storage system from Oracle EM. Oracle Virtual Machine Axiom Plug-in: Allowing Oracle VM and System Administrators to manage, maintain, monitor and provision the Axiom 600 storage system from Oracle VM using Storage Connect. Oracle Axiom Data Protection Manager 3.1: Leveraging Axiom's Copy Services, System Administrators can automatically create Application Consistent Clones of critical Windows and Oracle DataBase environments for quick recovery. For More Information Go To: Oracle.com Pillar Axiom Page Oracle Technology Network SAN Page

    Read the article

  • Oracle sort précipitamment OpenOffice 3.3, 24 heures après l'arrivée de LibreOffice 3.3

    Oracle sort précipitamment OpenOffice 3.3, 24 heures après l'arrivée de LibreOffice 3.3 Mise à jour du 28.01.2011 par Katleen Oracle vient de sortir la version 3.3 de sa suite bureautique libre OpenOffice.org. Cette mise à disposition du public à presque été passée sous silence tant elle fut discrète. Elle semble avoir été précipitée et pas très bien organisée. Quoiqu'il en soit, cette nouvelle mouture ( tournant sous Windows, Linux -x86 32 bits et 64 bits-,Mac OS X -x86 et PowerPC- et Solaris -x86 et SPARC-). apporte plusieurs nouveautés : - renforcement de la protection des documents du tableur et du traitement de texte - possibilité de gére...

    Read the article

  • Live Webcast: Introducing Oracle Identity Management 11gR2

    - by B Shashikumar
    Please join Oracle and customer executives for the launch of Oracle Identity Management 11g R2, the breakthrough technology that dramatically expands the reach of identity management to cloud and mobile environments. Until now, businesses have been forced to piece together different kinds of technology to get comprehensive identity protection. The latest release of Oracle Identity Management 11g changes all that. Only Oracle Identity Management 11gR2 allows you to: Unlock the potential of cloud, mobile, and social applications Streamline regulatory compliance and reduce risk Improve quality of service and end user satisfaction Don't leave your identity at the office. Take it with you on your phone, in the cloud, and across the social world. Register now for the interactive launch Webcast and don’t miss this chance to have your questions answered by Oracle product experts.Date: Thursday, July 19, 2012 Time: 10am Pacific / 1pm Eastern

    Read the article

  • Mozilla isole les plug-in de Firefox avec la sortie d'une nouvelle beta et la mise en application du

    Mise à jour du 21/04/09 Mozilla isole les plug-ins de Firefox Avec la sortie de la beta de la version 3.6.4 et du "Projet Lorentz" Le futur Firefox 3.6.4 ne sera pas une mise à jour aussi mineure que cela. L'arrivée du Projet Lorentz est en effet attendue avec impatience par les utilisateurs du navigateur. Pour l'instant en beta (qui vient tout juste de sortir), cette nouvelle release, issue de ce projet Lorentz, inclut un système de protection contre les crashs en isolant les plugins défectueux lorsque ceux-ci ont un problème. Sont particulièrement ciblés Flash, Quicktime et Silverlight. ...

    Read the article

  • Hardware refresh of Solaris 10 systems? Try this!

    - by mgerdts
    I've been seeing quite an uptick in the people that are wanting to install Solaris 11 when they are doing hardware refreshes.  I applaud that effort - Solaris 11 (and 11.1) have great improvements that advance the state of the art and make the best use of the latest hardware. Sometimes, however, you really don't want to disturb the OS or upgrade to the a later version of an application that is certified with Solaris 11.  That's a great use of Solaris 10 Zones.  If you are already using Solaris Cluster, or would like to have more protection as you put more eggs in an ever growing basket, check out solaris10 Brand Zone Clusters.

    Read the article

  • Skype est-il assez sécurisé ? Privacy International affirme que non

    Skype est-il assez sécurisé ? Privacy International affirme que non Le puissant groupe Privacy International s'est penché sur les paramètres de sécurisation de Skype, et les juge insuffisants. Le service de VoIP ne protégerait pas assez ses utilisateurs, notamment en affichant leur nom complet dans les listes de contact, avance le groupe. Autre reproche fait au logiciel : il serait facile pour les pirates de lui substituer leur propre version, mais infectée d'un Trojan celle-ci, du fait de l'absence de la protection HTTPS sur la page de téléchargement officielle. Privacy International met également en garde contre le VBR, le codec utilisé pour la compression des flux audios. Ce dernier permettrait à 50%, voire 90% de...

    Read the article

  • Chessin's principles of RAS design

    - by user12608173
    In late 2001 I developed an internal talk on designing hardware for easier error injection, prevention, diagnosis, and correction. (This talk became the basis for my paper on injecting errors for fun and profit.) In that talk (but not in the paper), I articulated 10 principles of RAS design, which I list for you here: Protect everything Correct where you can Detect where you can't Where protection not feasible (e.g., ALUs), duplicate and compare Report everything; never throw away RAS information Allow non-destructive inspection (logging/scrubbing) Allow non-destructive alteration (injection) (that is, only change the bits you want changed, and leave everything else as is) Allow observation of all the bits as they are (logging) Allow alteration of any particular bit or combination of bits (injection) Document everything Of course, it isn't always feasible to follow these rules completely all the time, but I put them out there as a starting point.

    Read the article

  • Y a-t-il réellement un problème de malwares sur les OS mobiles ? Un responsable de Google qualifie les éditeurs d'antivirus de "charlatans"

    Y a-t-il réellement un problème de malwares sur les OS mobiles ? Un responsable de Google qualifie les éditeurs d'antivirus de "charlatans" « Si vous travaillez pour une compagnie vendant une protection antivirus pour Android, RIM et iOS, vous devriez en avoir honte », déclare Chris DiBona sur son compte Google+. L'Open Source Programs Manager chez Google s'attaque aux éditeurs de solutions de sécurité pour OS mobiles, inutiles d'après lui. Il les qualifie de « charlatans et arnaqueurs ». Dans un plaidoyer au discours incisif, il se pose naturellement en défenseur des logiciels open source. Il explique que les logiciels libres sont « major...

    Read the article

  • Do I own copyright of program I made in own time?

    - by Dave Mess
    I created a software package that aids electrical engineers with common calculations used on site (substations to be specific). I created the package in my own time, without being asked and without guidance. The package is now widely used within my company and I intend to distribute it nationally. Do I own the copyright? My contract does state that all work produced is theirs, but this was outside of work and outside of my 'scope of work'. My company is mainly a civil and construction company and had no influence in the creation of the program. From comments: This is the paragraph "During the course of your service, you will disclose to the company all information, formulae, processes, inventions or improvements which you have learned, discovered or evolved during the course of your service or in connection with the business of the company and will sign any necessary documents to enable the company to obtain patent protection whether still in the company service or not. " They are taking it seriously and have got their lawyers.

    Read the article

  • AT&T brevète une technologie permettant de tracer le téléchargement de contenu illicite sur les réseaux P2P

    Serait ce vraiment la fin du réseau peer-to-peer ? AT&T vient de breveter une technologie permettant de tracer le téléchargement de contenu illicite dans les réseaux P2PLes réseaux P2P : adulés par une très forte communauté d'utilisateurs, détestés par les organismes de protection de la propriété intellectuelle attirent de nouveau l'attention des médias. Cette fois-ci, le P2P est mis au-devant de la scène par la compagnie AT&T. Cette dernière vient de breveter une technologie qui permet une bonne traçabilité du contenu des réseaux peer-to-peer.La principale cible de cette technologie sont les fichiers torrents auxquels les utilisateurs ont accès par le biais des flux RSS et moteurs de recherche de ...

    Read the article

  • Apple de nouveau pointé du doigt par Greenpeace, qui félicite Wipro et HP pour leur respect de l'environnement

    Apple de nouveau pointé du doigt par Greenpeace qui félicite Wipro et HP pour leur respect de l'environnement Dans son action pour la protection de l'environnement, Greenpeace évalue l'engagement des entreprises technologiques pour le respect de l'environnement. L'ONG écologiste vient de publier son rapport « Guide to Greener Electronics » des entreprises les plus écolos dans le domaine du hardware. Dans ce classement, Apple perd deux places par rapport à la dernière liste de Greenpeace, pour se retrouver à la sixième position avec un score de 4,5 sur 10. La firme à la pomme aurait fait des investissements dans l'utilisation des énergies renouvelables et l...

    Read the article

  • Un outil générant de fausses IP vient défier Hadopi, SeedFuck remettra-t-il en cause les preuves de

    Un outil générant de fausses IP vient défier Hadopi, SeedFuck remettra-t-il en cause les preuves de culpabilité ? Toujours aussi cordialement détesté par une majorité de français, l'Hadopi (Haute autorité pour la diffusion des oeuvres et la protection des droits sur Internet) a désormais un nouvel adversaire. SeedFuck est un nouvel outil permettant de générer de fausses activités autour de contenus protégés sur les réseaux P2P. Evidemment, ce programme est totalement illicite, et nous ne vous en montrerons pas le code source, bien qu'il ai été rendu public. Son but est clairement de mettre des batons dans les roues des chasseurs de pirates, commandités par les ayants droits (comprenez les artistes, ou...

    Read the article

  • Ubuntu Windows Installer - Firewall

    - by Max
    I installed Ubuntu with the Windows installer to use it along side. I could not find anything to activate a firewall so I thought its inbuilt and running. However now I read that I have to activate it manually? The command that was shown actually didnt promt any repsonse. Is it that the Windows installer version does not have that. Also my greatest concern is that I was without firewall protection for 2-3 weeks and I am using alot of public networks (university and dorm(only cable but still)). Thanks in advance.

    Read the article

  • OTRS upgrade 3.0 to 3.1 fails

    - by Valentin0S
    Today I've started upgrading OTRS from version 2.3 to 2.4 , 2.4 to 3.0 and 3.0 to 3.1. Everything went smoothly except the upgrade from 3.0 to 3.1 OTRS provides a few perl scripts which make the upgrade easier. I've used these scripts for each upgrade step. The upgrade from 3.0 to 3.1 fails at the following after using the upgrade script. scripts/DBUpdate-to-3.1.pl The error is : root@tickets:/opt/otrs# su - otrs $ scripts/DBUpdate-to-3.1.pl Migration started... Step 1 of 24: Refresh configuration cache... If you see warnings about 'Subroutine Load redefined', that's fine, no need to worry! Subroutine Load redefined at /opt/otrs/Kernel/Config/Files/ZZZAAuto.pm line 5. Subroutine Load redefined at /opt/otrs/Kernel/Config/Files/ZZZAuto.pm line 4. done. Step 2 of 24: Check framework version... done. Step 3 of 24: Creating DynamicField tables (if necessary)... done. DBD::mysql::db do failed: Cannot add or update a child row: a foreign key constraint fails (`pp_otrs`.`dynamic_field`, CONSTRAINT `FK_dynamic_field_create_by_id` FOREIGN KEY (`create_by`) REFERENCES `users` (`id`)) at /opt/otrs-3.1.10/Kernel/System/DB.pm line 478. ERROR: OTRS-DBUpdate-to-3.1-10 Perl: 5.14.2 OS: linux Time: Wed Sep 5 15:36:20 2012 Message: Cannot add or update a child row: a foreign key constraint fails (`pp_otrs`.`dynamic_field`, CONSTRAINT `FK_dynamic_field_create_by_id` FOREIGN KEY (`create_by`) REFERENCES `users` (`id`)), SQL: 'INSERT INTO dynamic_field (name, label, field_order, field_type, object_type, config, valid_id, create_time, create_by, change_time, change_by) VALUES (?, ?, ?, 'Text', 'Ticket', '--- {} ', 1, '2012-09-05 15:36:20' , 1, '2012-09-05 15:36:20' , 1)' Traceback (20405): Module: main::_DynamicFieldCreation (v1.85) Line: 466 Module: scripts/DBUpdate-to-3.1.pl (v1.85) Line: 95 Could not create new DynamicField TicketFreeKey1 at scripts/DBUpdate-to-3.1.pl line 477. Step 4 of 24: Create new dynamic fields for free fields (text, key, date)... $ Did anyone else face the same issue? Thanks in advance

    Read the article

  • Mounting NAS drive with cifs using credentials file through fstab does not work

    - by mahatmanich
    I can mount the drive in the following way, no problem there: mount -t cifs //nas/home /mnt/nas -o username=username,password=pass\!word,uid=1000,gid=100,rw,suid However if I try to mount it via fstab I get the following error: //nas/home /mnt/nas cifs iocharset=utf8,credentials=/home/username/.smbcredentials,uid=1000,gid=100 0 0 auto .smbcredentials file looks like this: username=username password=pass\!word Note the ! in my password ... which I am escaping in both instances I also made sure there are no eol in the file using :set noeol binary from Mount CIFS Credentials File has Special Character chmod on .credentials file is 0600 and chown is root:root file is under ~/ Why am I getting in on the one side and not with fstab?? I am running on ubuntu 12 LTE and mount.cifs -V gives me mount.cifs version: 5.1 Any help and suggestions would be appreciated ... UPDATE: /var/log/syslog shows following [26630.509396] Status code returned 0xc000006d NT_STATUS_LOGON_FAILURE [26630.509407] CIFS VFS: Send error in SessSetup = -13 [26630.509528] CIFS VFS: cifs_mount failed w/return code = -13 UPDATE no 2 Debugging with strace mount through fstab: strace -f -e trace=mount mount -a Process 4984 attached Process 4983 suspended Process 4985 attached Process 4984 suspended Process 4984 resumed Process 4985 detached [pid 4984] --- SIGCHLD (Child exited) @ 0 (0) --- [pid 4984] mount("//nas/home", ".", "cifs", 0, "ip=<internal ip>,unc=\\\\nas\\home"...) = -1 EACCES (Permission denied) mount error(13): Permission denied Refer to the mount.cifs(8) manual page (e.g. man mount.cifs) Process 4983 resumed Process 4984 detached Mount through terminal strace -f -e trace=mount mount -t cifs //nas/home /mnt/nas -o username=user,password=pass\!wd,uid=1000,gid=100,rw,suid Process 4990 attached Process 4989 suspended Process 4991 attached Process 4990 suspended Process 4990 resumed Process 4991 detached [pid 4990] --- SIGCHLD (Child exited) @ 0 (0) --- [pid 4990] mount("//nas/home", ".", "cifs", 0, "ip=<internal ip>,unc=\\\\nas\\home"...) = 0 Process 4989 resumed Process 4990 detached

    Read the article

  • Bash Script - Traffic Shaping

    - by Craig-Aaron
    hey all, I was wondering if you could have a look at my script and help me add a few things to it, How do I get it to find how many active ethernet ports I have? and how do I filter more than 1 ethernet port How I get this to do a range of IP address? Once I have a few ethenet ports I need to add traffic control to each one #!/bin/bash # Name of the traffic control command. TC=/sbin/tc # The network interface we're planning on limiting bandwidth. IF=eth0 # Network card interface # Download limit (in mega bits) DNLD=10mbit # DOWNLOAD Limit # Upload limit (in mega bits) UPLD=1mbit # UPLOAD Limit # IP address range of the machine we are controlling IP=192.168.0.1 # Host IP # Filter options for limiting the intended interface. U32="$TC filter add dev $IF protocol ip parent 1:0 prio 1 u32" start() { # Hierarchical Token Bucket (HTB) to shape bandwidth $TC qdisc add dev $IF root handle 1: htb default 30 #Creates the root schedlar $TC class add dev $IF parent 1: classid 1:1 htb rate $DNLD #Creates a child schedlar to shape download $TC class add dev $IF parent 1: classid 1:2 htb rate $UPLD #Creates a child schedlar to shape upload $U32 match ip dst $IP/24 flowid 1:1 #Filter to match the interface, limit download speed $U32 match ip src $IP/24 flowid 1:2 #Filter to match the interface, limit upload speed } stop() { # Stop the bandwidth shaping. $TC qdisc del dev $IF root } restart() { # Self-explanatory. stop sleep 1 start } show() { # Display status of traffic control status. $TC -s qdisc ls dev $IF } case "$1" in start) echo -n "Starting bandwidth shaping: " start echo "done" ;; stop) echo -n "Stopping bandwidth shaping: " stop echo "done" ;; restart) echo -n "Restarting bandwidth shaping: " restart echo "done" ;; show) echo "Bandwidth shaping status for $IF:" show echo "" ;; *) pwd=$(pwd) echo "Usage: tc.bash {start|stop|restart|show}" ;; esac exit 0 thanks

    Read the article

< Previous Page | 103 104 105 106 107 108 109 110 111 112 113 114  | Next Page >