Let’s be real for a second — Batman would be nothing without the Batcave. No cool weapons cache. Nowhere to hang his Batsuit. And definitely nowhere to park the Batmobile. If only he’d had something like the Batcave to store it all. Somewhere to put it down for a hot minute and then pick everything […]
Court papers filed by the U.S. Government and Apple against a former manager detail a scheme that allegedly saw confidential Apple data supplied to Asian electronics companies over more than three years in return for kickbacks of more than US$1 million.
Nearly three-quarters of corporate security and IT professionals in the U.S. have found "inappropriate" pictures, videos or browser cache links on employee laptops, a survey released Wednesday shows.
Apple has released a statement repeating that it doesn't track or log iPhone locations, but only the locations of nearby cell towers and Wi-Fi hotspots. Two software updates will make changes, storing less data, and encrypting the phone's cache.
Like so many things, corporate video-over-IP has been heralded as the “next big thing” for some time now. And, like so many technology breakthroughs before it, IP video is finally entering many companies through the “back door” – the employee.
A time-honored tradition in IT is the box of "scratch tapes" in the back room. Cartons of used-but-presumably-still-serviceable tapes can typically be found in a back storeroom at most sites, or in bottom drawers of desks. Tape monkeys who need a tape in a hurry have been known to dip into this cache. Sometimes the tapes work, sometimes...
In response to our question last week about how to purge the cache that Outlook uses to auto-complete names entered in message address fields, readers Road Larse, Brian Tinsley and Kevin Square all responded more or less at the same time with the scoop.
A year has passed since security researcher Dan Kaminsky disclosed a serious flaw in the DNS that makes it possible for hackers to launch cache poisoning attacks, where traffic is redirected from a legitimate Web site to a fake one without the Web site operator or end user knowing. Kaminsky’s disclosure was a wake-up call to network vendors and ISPs about the inherent weaknesses in DNS, the foundational Internet standard that matches IP addresses with domain names.
I’m always happy to find new security resources on the Web for my students and readers, so I was particularly pleased to run across the excellent work posted on the research pages of LURHQ Managed Security Services while I was looking for information on DNS cache poisoning the other day.
Part one of this pair of columns described "cold boot attacks" and their security implications, in particular for software-implemented full-disk encryption. Security expert Jurgen Pabel continues with part two.
Also: Sygate fixes Google Desktop Search cache vulnerability; Speculation has Juniper announcing TX multichassis router interconnect system; Congress increases H-1B hires; HP to spend $200 million on layoffs
Several members of the bandwidth-optimization crowd have recently made announcements. These are the vendors that compress, cache, shape and otherwise help you improve the performance of applications that were often initially developed to run over high-speed LANs, and make them work in the bandwidth-constrained and less predictable WAN.
In case you've missed it, someone recently dumped a large cache of e-mail files and documents from the University of East Anglia University's prestigious Climactic Research Unit onto the ‘Net. The CRU is one of the leading climatology research institutions, and its data and models provide much of the infrastructure on which the theory of anthropogenic global warming (AGW) is based.
Does your organization have a significant cache of BlackBerry devices? If so, you probably use BlackBerry Enterprise Service to manage the devices, but you've learned that BES management capabilities are rather limited. Fiberlink Communications now has a visibility service for BlackBerry handhelds that provides much more meaningful and actionable insight than you can get through BES.
Deploying and using some sort of proxy system is nothing new. Proxy servers and proxy cache to name a couple, have been used to offload work and storage for example in large environments to help boost net performance.