Search Results

Search found 6397 results on 256 pages for 'secure emails'.

Page 135/256 | < Previous Page | 131 132 133 134 135 136 137 138 139 140 141 142  | Next Page >

  • How Can I Disable Windows 7's Aero Performance Warnings?

    - by Jason Fitzpatrick
    You know your computer isn’t cutting edge, but there’s no need for Windows 7 to constantly remind you. Read on to see how you can disable its constant nagging to adjust your color scheme to improve performance. Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Meet and Greet with IDM Executives at Oracle OpenWorld

    - by Tanu Sood
    Oracle’s Identity Management Team Invites You to Learn How to Secure The New Digital Experience Come see how the Oracle Identity Management platform can position your company to take advantage of the emerging business opportunities. Leverage Social Identities for web authentication Enable customers and employees to interact through their mobile devices Deploy Self Service User Provisioning for quick role changes based on business needs We look forward to seeing you there! Wednesday, October 3rd  3:30-4:30 PM  Meeting 4:30-5:30 PM  Cocktail Reception Four Seasons Hotel Yerba Buena Room 757 Market Street San Francisco, CA 94103 415.633.3000 http://www.fourseasons.com/sanfrancisco/   RSVP Now Copyright © 2012, Oracle and/or its affiliates.  All rights reserved. Contact Us | Legal Notices and Terms of Use | Privacy Statement

    Read the article

  • Where can I hire a trustworthy professional PHP programmer?

    - by JJ22
    I wrote a php application for my website that really needs to work well and be as secure as possible. I'm a novice php programmer, so while my application seems to work well, there may be inefficiencies or security vulnerabilities. I feel that I should have someone look over my code before making the application publicly available, but I'm hesitant to just post it online because it handles some rather sensitive things. Where can I find a competent, trustworthy, and relatively inexpensive php programmer who would be willing to review a few thousand lies of well-commented easy-to-read php code? Thank you!

    Read the article

  • Unable to boot to Ubuntu

    - by nsk
    Just got a new laptop and removed Windows 8 and installed 13.10 using LiveUSB. Initially it was booting to "No boot media" but I was able to resolve it with boot-repair. I realized some of the items I need isn't supported on 13.10, so attempted to install 13.04 instead. Now without LiveUSB, the laptop just boots to "No boot media" but boot repair doesn't seem to be fixing it. Tried going back to 13.10, but no dice. After boot repair it says "Please do not forget to make your BIOS boot on sda1/EFI/ubuntu/grubx64.efi file!". GParted shows sda1 has the boot flag. Using Toshiba Satellite P50. Secure Boot disabled. UEFI enabled. Any help would be highly appreciated. http://paste.ubuntu.com/6366556/

    Read the article

  • Database in the cloud?

    - by Jlouro
    Some of my recent clients are asking for remote connections to the office server, for standalone work, etc, in winForm applications. Since the concept of the web is remote connection to a server both of data and resources, it should be possible to place both of this in cloud and have the winForm apps connect to it as if web Apps. As any one tested this, is working like this? Is it fast enough? Is it secure? What is the best cloud host for this type of work ?

    Read the article

  • Hitachi Data Systems definition of cloud

    - by llaszews
    1. Ability to rapidly provision and de-provision a service. (aka: provisioning) 2. A consumption model where users pay for what they use. (aka: chargeback and showback) 3. The agility to flexibly scale - 'flex up' or 'flex down' - the services without extensive pre-planning. (aka: elasticity) 4. Secure, direct connection to the cloud without having to recode applications (aka: internet-based) 5. Multi-tenancy capabilitites that segregate and protect the data. (as it says multi-tenancy) Happen to be I have been talking about 4 of the 5. Did not mention connection to internet as assumed this.

    Read the article

  • How to Build Business Links With SEO Value

    In order to create order and plan in the site and make it more identifiable by a business community around, SEO link building requires membership strategies that aid it in its automatic operations by following a universal hub with potential links. The starting point is to obtain a link with the national or regional authority of commerce through its website. This will give the site a licensed look and due to its frequent interaction with the government body it will be a confidence boost for other links. This will also help market it as a recognized site that is secure to communicate with.

    Read the article

  • How to Use The US Windows 8 Store From Another Country

    - by Taylor Gibb
    Have you ever searched for an app only to find that its not available in your country? Luckily for us there is a work around for the Windows Store. How to use the US Windows Store from Another Country Press the Win + X keyboard combination, or right click in the bottom left hand corner of your screen to open the WinX menu, then launch the Control Panel. Now change the Control Panel’s view to the Small icons view. Then head into the Region settings. When the Region settings open you will need to switch over to the Location tab. Here you will be able to see the location that the Windows Store, as well as other applications , is using. You can change it by simply selecting United States from the drop down. That’s all there is to it. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Need suggestions on what you regard as &ldquo;security&rdquo;

    - by John Breakwell
    I’m currently writing a large piece on MSMQ security and wanted to check I was covering the right areas. I have some doubts as I’ve seen the occasional MSMQ forum question where a poster has used the word “security” in different contexts to what I was expecting. So here are the areas I plan to cover: Message security encryption on the wire (SSL and IPSEC) encryption of the message (MSMQ encryption) encryption of the payload (data encryption) signing and authentication Queue security SIDs and ACLs Discoverability Cross-forest issues Storage security NTFS permissions unencrypted data Service security Ports and Firewalls DOS attacks Hardened mode (HTTP only) RPC secure channel requirement authenticated RPC requirement Active Directory object permissions Setup Administrator requirements What else would you want to see?

    Read the article

  • Gone in 60 Seconds: An Insecure Database is an Easy Target

    - by Troy Kitch
    According to the recent Verizon Data Breach Investigations Report, 98% of breached data originates from database servers and nearly half are compromised in less than a minute! Almost all victims are not even aware of a breach until a third party notifies them and nearly all breaches could have been avoided through the use of basic controls. Join us for this November 28th webcast to learn more about the evolving threats to databases that have resulted in over 1 billion stolen records. Also, hear how organizations can mitigate risks by adopting a defense-in-depth strategy that focuses on basic controls to secure data at the source - the database. There's no turning back the clock on stolen data, but you can put in place controls to ensure your organization won't be the next headline. Note, this webcast will be recorded for on-demand access after November 28th. 

    Read the article

  • Need private personal access to ~three PHP pages

    - by Roger
    I would like secure access to the text output by three PHP scripts (the text output is JavaScript and html) . The security level is much less then financial data but important none-the-less. I have considered purchasing AND studying https and SSL certificates. Hostgator charges an extra $2/month for a private ip plus $50+ anually for a certificate. This is more then I want to spend for this project (time + money). Is there a simpler solution that is: less expensive easier to implement. I'm open to different approaches.

    Read the article

  • Safest way (i.e. HTTPS, POST, PGP) to send decryption keys through the web?

    - by theGreenCabbage
    I am in the final stages of development for my Revit plugin. This plugin is programmed in C#, and distributed via a DLL. One of the DLLs is an encrypted SQLite database (with proprietary data) that is in the form of a DLL. Currently, in development stages, the decryption key for the SQLite database is hardcoded in my main DLL (the program's DLL). For distribution, since DLLs are easily decompilable, I am in need of a new method to decrypt the DLL. My solution is to send our decryption keys from our servers securely to the host's computer. I was looking in POST, thinking it was more secure than GET, but upon research, it appears it's similarly insecure, only more "obscure" than GET. I also looked into HTTPS, but Hostgator requires extra money for HTTPS use. I am in need of some advice - are there any custom solutions I can do to implement this?

    Read the article

  • Ask The Readers: How Do You Find Your Next Game?

    - by Jason Fitzpatrick
    Once upon a time the only place for new video game information was down at the arcade. These days there’s a news source and niche for everyone and every kind of game; where and how do you find your next video game conquest? Word of mouth? App recommendations? Critical reviews? This week we’re interested in lining ourselves up for a little summer fun: tell us all about your tips, tricks, and techniques for finding the real gems in the pile of games that comes out every year. Sound off in the comments and then check back in on Friday for the What You Said roundup. HTG Explains: What Is Two-Factor Authentication and Should I Be Using It? HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux

    Read the article

  • VDC Research Webcast: Engineering Business Value in the IoT with Java 8

    - by tangelucci
    Date: Thursday, June 19, 2014 Time: 9:30 AM PDT, 12:30 PM EDT, 17:30 GMT The growth of the Internet of Things (IoT) opens up new service-driven opportunities, delivering increased efficiencies, better customer value, and improved quality of life. Realizing the full potential of the Internet of Things requires that we change how we view and build devices. These next-generation systems provide the core foundation of the services, rapidly transforming data to information to value. From healthcare to building control systems to vehicle telematic systems, the IoT focuses on how conneted devices can become more intelligent, enhance interoperability with other devices, systems and services, and drive timely decisions while delivering real business return for all. Join this webcast to learn about: Driving both revenue opportunities and operational efficiencies for the IoT value chain Leveraging Java to make devices more secure How Java can help overcome resource gaps around intelligent connected devices Suggestions on how to better manage fragmentation in embedded devices Register here: http://event.on24.com/r.htm?e=793757&s=1&k=4EA8426D0D31C60A2EDB139635FF75AB

    Read the article

  • No sound/audio after resuming from sleep

    - by hansvonaachen
    I've made a fresh UEFI install of Ubuntu 13.10 (64 bit) on a Lenovo Ideapad Z510 laptop with Intel i5 4200M processor. Ubuntu is the only OS installed on the computer, secure boot disabled. Everythings works fine (backlight issue fixed after editing rc.local file), the only minor trouble I have is resuming the laptop from "sleep" mode. If I close the lid and then wake the laptop opening it again, there is no audio/sound. I need to restart the computer (not even logging out helps). If I suspend the computer in a graphical way (not closing the lid): gearwheel in top right of the screen -- suspend and wake it up/turning on, audio works with no issues. Ideas how to fix this? Thanks!

    Read the article

  • Ask the Readers: How Do You Find Your Next Book?

    - by Jason Fitzpatrick
    It’s never been easier to find book reviews, recommendations, and comparisons; tools which are more necessary than ever thanks to the increasing number of new titles on the market. This week we want to hear all about your techniques for picking your next book. Whether you consult the New York Times best seller list, pore over Amazon book reviews, use a book suggestion engine, or just buy whatever the local book store has on the end-cap display that month, we want to hear about your system for finding new books. Sound off in the comments with your technique (bonus points for including links to any services or sites you use) and then check back on Friday for the What You Said roundup to see how your fellow readers fill their book bags. Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • Can't open Windows 8 after installing ubuntu 12.04

    - by Pyttar
    Yesterday, I tried ubuntu 12.04 LTS and I liked it, so I installed it in my computer with Windows 8. I managed to create a disk partition in Windows and I named it U:\UBUNTU. Then I installed Ubuntu inside this partition, but now, when I try to enter in my Windows 8, it gives me an error message: error: Secure Boot forbids loading module from (hd0,gpt5)/boot/grub/ntfs.mod. error: no such device: 2402319002316706 error: unknow command 'drivemap'. error: invalid EFI file path. Press any key to continue... What can I do? Please I need urgent help, I need to access to Windows 8 and I don't want to lose any data... I checked for the Windows disk and I can se there's all my information there, so, I didn't lose anything. Thanks.

    Read the article

  • Is there a way to develop desktop software using PHP?

    - by user1492018
    I have to develop a real estate marketing CRM software for my client - where the application is installed on desktop but can also be accessed from web. 2 reasons why they want the application to run from desktop : So that it can work with/without internet connection They don't want their complete data to be online They want to access few of the data like property listing & inquiries (managed from desktop application) from their website through secure login & password. The data that is entered in desktop application should be automatically synchronized with the website application. I was wondering if there is a way to develop this kind of software using PHP & MySQL. If yes, it will be great if anyone can provide me the referral link.Else please suggest, which language should I use.

    Read the article

  • Is it possible to boot Ubuntu using the Windows bootloader?

    - by badp
    As noted by many people, Windows 8's UEFI requirements might will won't get in the way of installing Linux (or whatever), as the replacement bootloader will also need to be signed somehow. Some systems All systems will let you disable the signature requirement, but the feature might be hidden to disable or you might not be willing to give up on the benefits of a secure bootloader. Is it necessary to replace the bootloader in the first place? To keep ourselves to software that's gone golden, how can I install Ubuntu 11.04 using Windows 7's own bootloader?

    Read the article

  • Database Insider - October 2012 issue

    - by Javier Puerta
    The October issue of the Database Insider newsletter is now available. (Full newsletter here) NEWS   Newly Launched Oracle Exadata X3 Redefines Extreme Performance At Oracle OpenWorld 2012, Oracle announced the general availability of Oracle Exadata Database Machine X3, a complete package of servers, storage, networking, and software that is massively scalable, secure, and fully redundant—and ideally suited for the varied and unpredictable workloads of cloud computing. Read More WEBCASTS What Are Oracle Users Doing to Improve Availability and Disaster Recovery? The Independent Oracle Users Group (IOUG) surveyed more than 350 data managers and professionals regarding planned and unplanned downtime, database high availability, and disaster recovery solutions. Download the report and watch the Webcast today.

    Read the article

  • Ubuntu 13.04 not detecting operating system Windows 8

    - by hualur
    I have a Samsung NP740U3E with pre-installed Windows 8 (boots with UEFI). I installed Ubuntu 13.04 without problems. Later, Windows 8 did a BIOS update which messed up everything, nothing would boot. I recovered everything and went back to fabric settings. Now Windows 8 works fine, but when I try to install Ubuntu it does not detect any operating system, so I can`t install Ubuntu alongside Windows. I`ve googled as much as I can, ran a boot-repair, disabled fast- and secure-boot. I have a GPT disc, been looking into gdisk without luck. Here`s my boot-repair summary http://paste.ubuntu.com/5835719/ Is it necessary to convert the GPT disc to MBR? Is it possible to hard-reset the disc "even more" than fabric settings? Thanks in advance.

    Read the article

  • CSC Enables IT Transformation for a Large Public Sector Health Agency with Middleware

    - by Tanu Sood
    CSC is a global leader in next-generation IT services and solutions. The company helps its clients achieve strong returns on their technology investments through its best-in-class industry solutions, domain expertise, and global scale. So, when CSC was tasked with an IT modernization project, the IT services leader relied on Oracle Fusion Middleware solutions to build a next-generation, service-oriented architecture environment to this large public-sector healthcare agency’s several thousand facilities. Catch this fantastic success story of how they enabled a secure, service-oriented architecture environment and a robust platform with interoperability and scalability that supports thousands of hospitals, and with the capacity to support 800,000 provider organizations and process millions of files during peak periods. Learn how Oracle Fusion Middleware can help your organization. 

    Read the article

  • Problem installing Ubuntu 13.10 alongside Windows 8

    - by kustrle
    What I have: Sony Vaio laptop (SVE1512E6EW) with preinstalled Windows 8. I disabled Secure Boot some time ago in BIOS. I already had Ubuntu (previous version) installed on it, but removed it some time ago. After that, the default Windows boot menu is showing up everytime I boot up computer, and the only entry is Windows 8. What I did: Burned Ubuntu 13.10 DVD Restarted computer and booted from it Chosen Install Ubuntu (not Try Ubuntu) Created new ext4 partition from free space Installed Ubuntu on it What happened: After the installation I restarted computer. Windows default boot menu showed up (just as before) and the only entry was still Windows 8. If you have any additional questions I will try to answer them as fast as possible.

    Read the article

  • A Safe Way to Allow Upload of All File Types?

    - by user34682
    By default WordPress restricts the file types that can be uploaded to /uploads using the default Media Manager. I know it is possible to manually extend the allowed file types. I also know it is possible to change functions.php to allow ALL file types to be uploaded. This restriction obviously exists for security concerns - e.g. someone could upload a harmful .exe Would it not be possible to allow secure upload of all filetypes by setting the permissions of the /uploads directory to prevent execution of any of its contents? Thus it wouldn't matter if someone uploaded a harmful file because it would not be executable on the server...

    Read the article

  • My Latest Books &ndash; Professional C# 2010 and Professional ASP.NET 4

    My two latest books are out! Professional ASP.NET 4 in C# and VB Professional C# 4 and .NET 4 From the back covers: Take your web development to the next level using ASP.NET 4 ASP.NET is about making you as productive as possible when building fast and secure web applications. Each release of ASP.NET gets better and removes a lot of the tedious code that you previously needed to put in place, making common ASP.NET tasks easier. With this book, an unparalleled team of authors walks you...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

< Previous Page | 131 132 133 134 135 136 137 138 139 140 141 142  | Next Page >