Adobe Acrobat and Reader PDF applications are vulnerable to a new attack that relies on social engineering to trick users into clicking on something they shouldn't.
<b>Serverwatch:</b> "Based on Oracle's recent actions, it seems the company is hell-bent on driving as many of its potential customers as possible away from the UNIX offerings it acquired from Sun and into the arms of Red Hat and other enterprise Linux vendors."
As the use of mobile devices continues to soar, enterprise cloud applications are now resident in the palm of your hand. With this mobility comes ever greater responsibility to keep enterprise data safe.
Three Spanish hackers believed to be responsible for using a botnet to steal log-in credentials and customer banking data were arrested following a multinational investigation.
<b>Linux Tutorial:</b> "The book is organized into 9 chapters, holding a total of 99 recipes in all. Each recipe introduces the task, tells how to prepare to perform the task, offers the specific steps, describes how the task is supposed to work, and lists any additional information related to the task."
In an effort to boost security across the Web, Mozilla is extending its service for verifying plugins to competing browsers, although some questions remain.
Of course everyone is diligent about making timely backups. There are many ways to backup your data; here is the motley collection of backup schemes and devices that I use.
<b>The H Open:</b> "Almost two months after the technical preview was released, the development of version 4.7 of the cross-platform Qt C++ framework for GUI applications is beginning to take shape, as Nokia has now presented a beta version."
<b>ServerWatch: </b>"A really useful feature of the open source editor Vim is the macro command, which allows you to record and reply a series of commands."
<b>Facebook:</b> "We built Flashcache to help us scale InnoDB/MySQL, but it was designed as a generic caching module that can be used with any application built on top of any block device."
New study surveying Microsoft vulnerabilities concludes that most can be mitigated by tightening up admin permissions ahead of the monthly patch cycle.