Search Results

Search found 5864 results on 235 pages for 'secure gateway'.

Page 86/235 | < Previous Page | 82 83 84 85 86 87 88 89 90 91 92 93  | Next Page >

  • Week in Geek: SkyDrive Bug Blocks Opera Browser Users from the Service

    - by Asian Angel
    Our latest edition of WIG is filled with news link coverage on topics such as how the FBI and CIA can read your e-mail, Blizzard admits to wrongfully banning a Diablo 3 Linux user and refunds his money, e-mailed malware disguised as group coupon offers are increasing, and more. Chainlink clipart courtesy of For Web Designer. How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • How can I tell if ZRTP is enabled in a Twinkle SIP call?

    - by komputes
    I recently attended a talk about GNU Telephony. I was informed that Twinkle supports ZRTP for encrypted SIP calls. I went into Edit User Profile Security and made sure that ZRTP was enables and that all boxes were checked. I asked a friend to do the same and then we called each other. There is no immediate indication that I can see that the call is secure. How can I tell if ZRTP is enabled in a Twinkle SIP call?

    Read the article

  • Enhance That! [Comic]

    - by Asian Angel
    Works perfectly every time, right? Note: You can view the full-size version at the link below if you have trouble reading any of the text… I hate it in espionage TV series when… [Manu Cornet - Bonkers World Blog] Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • How to Reset Your Forgotten Domain Admin Password on Server 2008 R2

    - by Taylor Gibb
    Forgetting your password is always a pain, but luckily there’s an easy way to reset your Domain Administrator password. All you need is a copy of the Windows Server 2008 R2 installation disk and one simple command line trick. HTG Explains: What Is Windows RT and What Does It Mean To Me? HTG Explains: How Windows 8′s Secure Boot Feature Works & What It Means for Linux Hack Your Kindle for Easy Font Customization

    Read the article

  • Upgrading Oracle Enterprise Manager: 12c to 12c Release 2

    - by jorge_neidisch
    1 - Download the OEM 12c R2. It can be downloaded here: http://www.oracle.com/technetwork/oem/grid-control/downloads/index.html  Note: it is a set of three huge zips. 2 - Unzip the archives 3 - Create a directory (as the oem-owner user) where the upgraded Middleware should be installed. For instance: $ mkdir /u01/app/oracle/Middleware12cR2 4 - Back up OMS (Middleware home and inventory), Management Repository and Software Library. http://docs.oracle.com/cd/E24628_01/doc.121/e24473/ha_backup_recover.htm#EMADM10740 5 - Ensure that the Management tables don't have snapshots:  SQL> select master , log_table from all_mview_logs where log_owner='<EM_REPOS_USER>If there are snapshots drop them:  SQL> Drop snapshot log on <master> 6 - Copy emkey  from existing OMS:  $ <OMS_HOME>/bin/emctl config emkey -copy_to_repos [-sysman_pwd <sysman_pwd>]To verify whether the emkey is copied, run the following command: $ <OMS_HOME>/bin/emctl status emkeyIf the emkey is copied, then you will see the following message:The EMKey  is configured properly, but is not secure.Secure the EMKey by running "emctl config emkey -remove_from_repos". 7 - Stop the OMS and the Agent $ <OMS_HOME>/bin/emctl stop oms $ <AGENT_HOME>/bin/emctl stop agent 8 - from the unzipped directory, run $ ./runInstaller 8a - Follow the wizard: Email / MOS; Software Updates: disable or leave empty. 8b - Follow the wizard:  Installation type: Upgrade -> One System Upgrade. 8c - Installation Details: Middleware home location: enter the directory created in step 3. 8d - Enter the DB Connections Details. Credentials for SYS and SYSMAN. 8e - Dialog comes: Stop the Job Gathering: click 'Yes'. 8f- Warning comes: click 'OK'. 8g - Select the plugins to deploy along with the upgrade process 8h- Extend Weblogic: enter the password (recommended, the same password for the SYSMAN user). A new directory will be created, recommended: /u01/app/oracle/Middleware12cR2/gc_inst 8i - Let the upgrade proceed by clicking 'Install'. 8j - Run the following script (as root) and finish the 'installation':  $ /u01/app/oracle/Middleware12R2/oms/allroot.sh 9 - Turn on the Agent:  $ <AGENT_HOME>/bin/emctl start agent  Note that the $AGENT_HOME might be located in the old Middleware directory:  $ /u01/app/oracle/Middleware/agent/agent_inst/bin/emctl start agent 10 - go to the EM UI. Select the WebLogic Target and choose the option "Refresh WebLogic Domain" from the menu. 11 - Update the Agents: Setup -> Manage Cloud Control -> Upgrade Agents -> Add (+) Note that the agents may take long to show up. ... and that's it! Or that should be it !

    Read the article

  • Google’s Zeitgeist 2012: A Year In Review

    - by Jason Fitzpatrick
    Once a year Google releases their Zeitgeist–an overview of what the world was searching for during the previous year. Check out the year in review video and then browse the entire project. Google Zeitgeist 2012 Secure Yourself by Using Two-Step Verification on These 16 Web Services How to Fix a Stuck Pixel on an LCD Monitor How to Factory Reset Your Android Phone or Tablet When It Won’t Boot

    Read the article

  • How to Create Network File Shares with No Passwords in Windows 8

    - by Taylor Gibb
    We have all had to connect to a network share at some point only to have the authentication dialog pop up. There are many ways around it, for example mapping a network drive, but if you have a lot of users connecting to copy some files you may want to disable the password dialog instead of distributing your password. How To Delete, Move, or Rename Locked Files in Windows HTG Explains: Why Screen Savers Are No Longer Necessary 6 Ways Windows 8 Is More Secure Than Windows 7

    Read the article

  • Question: Why switch to Linux or a Mac?

    <b>Sure, It's Secure:</b> "I'm no friend to Windows. I know the operating system too well to trust it. But, I did think that even though Windows is defective by design, you could keep it relatively safe by installing patches quickly and using anti-virus software religiously. I was wrong."

    Read the article

  • New Interoperability Solutions for SQL Server 2012

    - by The Official Microsoft IIS Site
    I am excited to share some great news about how we are opening up the SQL Server data platform even further with expanded interoperability support through new tools that allow customers to modernize their infrastructure while maximizing existing investments and extending virtually any data anywhere. The SQL Server team today introduced several tools that enable interoperability with SQL Server 2012. These tools help developers to build secure, highly available and high performance applications for...(read more)

    Read the article

  • Oracle Magazine, March/April 2007

    Oracle Magazine March/April features articles on Business Intelligence, Oracle Fusion Applications, Oracle Secure Enterprise Search, Oracle Berkeley DB, Oracle Data Miner, Oracle ADF, and much more.

    Read the article

  • ADF Mobile Released!!

    - by Denis T
    ADFmfAnnounce We are pleased to announce the general availability of the newest version of Oracle’s ADF Mobile framework. This new framework provides the much anticipated on-device capabilities that the latest mobile applications require.  Feature Highlights Java - Oracle brings a Java VM embedded with each application so you can develop all your business logic in the platform neutral language you know and love! (Yes, even iOS!) JDBC - Since we give you Java, we also provide JDBC along with a SQLite driver and engine that also supports encryption out of the box. Multi-Platform - Truly develop your application only once and deploy to multiple platforms. iOS and Android platforms are supported for both phone and tablet. Flexible - You can decide how to implement the UI: (a) Use existing server-based UI framework like JSF. (b) Use your own favorite HTML5 framework like JQuery. (c) Use our declarative HTML5 component set provided with the framework. ADF Mobile XML or AMX for short, provides all the normal input and layout controls you expect and we also add charts/maps/gauges along with it to provide a very comprehensive UI controls. You can also mix and match any of the three for ultimate flexibility! Device Feature Access - You can get access to device features from either Java or JavaScript to invoke features like camera, GPS, email, SMS, contacts, etc. Secure - ADF Mobile provides integrated security that works with your server back-end as well. Whether you’re using remote URLs, local HTML or AMX, you can secure any/all of your features with a single consistent login page. Since we also give you SQLite encryption, we are assured that your data is safe. Rapid - Using the same development techniques that ADF developers are already used to, you can quickly create mobile applications without ever learning another language! Architecture ADF Mobile is a “hybrid” architecture that employs a natively built “container” on each platform that hosts a number of browser windows that are used to display the application content. We add the Java VM as a natively built library to the container for business logic.   How To Get Started ADF Mobile is an extension to the recently released JDeveloper version 11.1.2.3.0. Simple get the latest JDeveloper from Oracle Technology Network and use the Check for Updates feature to get the ADF Mobile extension. Note: ADF Mobile does not require developers to learn any other languages or frameworks but to build/deploy to iOS, you must be on an Apple MacintoshTM and have Xcode installed. To build/deploy to Android™ you must have the Android SDK installed.

    Read the article

  • Protect Your Brand with Oracle Pedigree and Serialization Manager in R12.1.3

    The pharmaceutical industry is facing new challenges as counterfeit products enter the ethical drug supply chain. Companies need to better secure the movement of their branded products from manufacturing to distribution to the end customer to insure proper efficacy. Pharmaceuticals are of special targets to "knock-offs", non-authorized generics as pirated-products enter the market. Oracle Pedigree and Serialization Manager (OPSM) helps firms' better track and control their products through a unique monitoring process.

    Read the article

  • Uploading images to a post like on the stackexchange websites [on hold]

    - by Loko
    Stackexchange uses imgur link to show the image to their website, but how do I do this? I am really curious on what ways I can upload an image to a file and show it immediatly again. Like webshops where you can post your products are also uploading images to show them immediatly. What way are there to do this and what is the best / most secure?(I assume how stackexchange does it), but I also have no idea how to do that.

    Read the article

  • How To Prevent Microsoft SQL Injection in ASP.Net

    This is a two-part tutorial series meant to help beginners understand MS SQL database injection and the problems associated with it particularly when applied to an ASP.NET web form application. It also outlines preventive measures which will be discussed thoroughly in the second part so that you can secure your SQL-based web applications.... ALM Software Solution ? Try it live! Requirements Management, Project Planning, Implementation Tracking & QA Testing.

    Read the article

  • Popularizing SEO Through Link Building

    The most important thing for a starting SEO site is by creating an authoritative facade that will boost confidence for the site. By this one will be committing the site into an easily accessible link with secure policies for the user such as a posting requesting the user to check out the private data protection criteria once they log on to the site.

    Read the article

  • Which areas( I.T.) are mostly affected by Outsourcing?

    - by Herbut
    My parents complain about me choosing a career in IT instead of business since most companies outsource IT nowadays. I always thought IT/Desktop supports are the ones who got outsourced, but it seems programmers are being outsourced to India as well. I need to choose the most secure area (less affected by outsourcing) in order to convince my parents. Which areas in IT are mostly affected by outsourcing?

    Read the article

  • "selected bootable device failed" error dual boot ubuntu alongside windows8.1

    - by user286280
    i have hp laptop i had installed windows 8 which i upgraded to 8.1 i wanted to dual boot ubuntu 14.04 with windows 8.1 i diasbled secure boot and fast startup then used a liveusb to boot then an error msg pops up saying "the selected bootable device failed" my system boot order is : os boot manager usb hdd internal hdd so my question is that y this msg(selected boot device failed) is popping up and should i try to keep usb hdd on the top of my sysytem boot order in order to get it working??? pls reply soon

    Read the article

  • Why Are We Still Using CPUs Instead of GPUs?

    - by Jason Fitzpatrick
    Increasingly GPUs are being used for non-graphical tasks like risk computations, fluid dynamics calculations, and seismic analysis. What’s to stop us from adopting GPU-driven devices? Today’s Question & Answer session comes to us courtesy of SuperUser—a subdivision of Stack Exchange, a community-drive grouping of Q&A web sites. 6 Ways Windows 8 Is More Secure Than Windows 7 HTG Explains: Why It’s Good That Your Computer’s RAM Is Full 10 Awesome Improvements For Desktop Users in Windows 8

    Read the article

  • ubuntu 12.04 with windows 8 dual boot not booting

    - by Nick
    I followed the procedure mentioned at Installing Ubuntu on a Pre-Installed Windows 8 (64-bit) System (UEFI Supported) on toshiba satellite laptop. also tried the boot-repair and logs @ http://paste.ubuntu.com/6327398/ Its not booting to windows as well as ubuntu. It goes to grub command prompt. When on initial screen it briefly shows error message as failed to open /efi/Microsoft/boot/grubx64. Please advise. EDIT : Secure boot in on and boot mode is UEFI Boot

    Read the article

  • Choosing the Best Search Engine Optimization

    When it comes to selecting any type of search engine Optimization Company, what you have to remember is that the most important thing is that you can secure a good company. One of the best things that you can do is to make sure that you have got your hands on any type of company that is country specific. In other words, what you have to remember is that you have to choose a company that is close to home.

    Read the article

  • How a Search Engine Optimization Company is of Use

    If you have a website, you know how very important and vital it is that you are able to ensure that your website can rank very highly and well in a search engine. In other words, what you have to do is to ensure that your website can secure the very first rank on any search engine.

    Read the article

< Previous Page | 82 83 84 85 86 87 88 89 90 91 92 93  | Next Page >