While enterprise security spends its time worrying about network-based attacks, the number of data breaches chalked up to Web applications continues to grow. Are you fighting yesterday's battles, too?
<b>Softpedia:</b> "This minimalistic operating system is created for advanced users who want to build a customized installation of Sabayon Linux. It can also be used for USB installations!"
<b>Howtoforge:</b> "SphinX is a great full-text search engine for MySQL. Installing the Sphinx daemon was straightforward as you can compile it from the source or use a .DEB/.RPM package but SphinxSE was a little bit tricky since it needed to be installed as a plugin on a running MySQL server."
Canonical, the lead commercial sponsor of the Ubuntu Linux distribution, is out with a new study this week looking at how users view and use their server platform.
<b>cmdln.org:</b> "Monitoring and analyzing performance is an important task for any sysadmin. Disk I/O bottlenecks can bring applications to a crawl. What is an IOP? Should I use SATA, SAS, or FC? How many spindles do I need?"
<b>Google Blog:</b> "So how did this happen? Quite simply, it was a mistake. In 2006 an engineer working on an experimental WiFi project wrote a piece of code that sampled all categories of publicly broadcast WiFi data."
<b>Linux & All:</b> "Over the past few years many different browsers have been created and become very popular for example Mozilla Firefox and Google Chrome, however, there are many browsers which are generally unheard of among the majority of web users. Here are 5 of them"
Seeking secure storage? This portable hard drive combines hardware encryption with hardware protection -- a built-in numeric keypad and PIN that stop unauthorized data access dead.
Seeking secure storage? This portable hard drive combines hardware encryption with hardware protection -- a built-in numeric keypad and PIN that stop unauthorized data access dead.
Developers have been notified that if they want to have their app ready for launch day, they have to keep to a short deadline. How much time do they have?
<b>LinuxLinks:</b> "Now, let's scrutinize the 8 games at hand. For each game we have compiled its own portal page, providing screenshots of the game in action, a full description of the game, with an in-depth analysis of the features of the game, together with links to relevant resources and reviews."
<b>Technology & Life Integration:</b> "The users and purchasers of microsoft systems are secure in themselves that they have a company behind them to point the bone at when things go wrong."
This year will likely be a busy one for Microsoft's Small Business Specialist partners around the globe, according to a survey of SMBs' IT spending plans.
Outsourced services from companies like Mammoth Networks and Dash Carrier let small operators expand their offerings without having to build out from scratch.
Nearly 10,000 participants in New Mexico's Medicaid program had their personal information compromised after a car with a laptop in the trunk was stolen in Chicago.
<b>Information Week:</b> "A new approach to memory management allows computer code to operate more efficiently on multicore processors and can reduce the overhead of security checks."