Архив метки: Unix

Windows 10 Spring Creators Update: 9 features enterprise users need to know about

Автор: | 11.04.2018

Microsoft’s Windows 10 Spring Creators Update (SCU) is due out any day now, and it’s a big one. As was the case with the Fall Creators Update, plenty of the features are geared toward consumers, but the enterprise world wasn’t forgotten. There are plenty of changes to Windows 10 in the Spring Creators Update that… Читать далее »

Windows 10 Spring Creators Update: A cheat sheet

Автор: | 07.04.2018

Windows 10 is never finished, with Microsoft adding a bevvy of new features to the OS twice a year. The latest bundle of features is almost here, with the Spring Creators Update expected to begin rolling out to PCs worldwide soon. Windows 10 users can expect a smattering of improvements, the most interesting of which… Читать далее »

Samba releases patch to fix two critical vulnerabilities

Автор: | 15.03.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: Samba versions 4.0.0 and up have two critical vulnerabilities that have just been solved by security patches. Samba users should update their instances immediately. The first vulnerability could allow an outside user to launch a DoS attack that takes printing capabilities offline, and… Читать далее »

Awareness is a good starting point to counter fileless malware

Автор: | 15.03.2018

From an attacker’s point of view, there is often a direct correlation between likelihood of success and ability to evade detection. In other words, flying under the radar of their victims’ detection capabilities gives attackers an advantage. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content,… Читать далее »

How to securely access Unix-based systems from Windows with VNC

Автор: | 13.03.2018

As an IT professional, you never really know when you’ll be tasked with supporting a device or operating system that’s not part of your norm. To add a bit of confusion to the mix, you also don’t know what constraints may be imposed on your access. Unless you manage a strict homogeneous environment, chances are… Читать далее »

Android P adds critical security updates, makes its case as an enterprise OS

Автор: | 08.03.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: Android P will require encryption for data traffic, passwords for encrypted backups, and notifications for background sensor operation, along with a more consistent fingerprint scanner. The new security features in Android P will help establish Android as an enterprise-ready OS, making it more… Читать далее »

Hackers target Japanese academics with phishing campaign to steal research data

Автор: | 07.03.2018

Building a slide deck, pitch, or presentation? Here are the big takeaways: BlackTech, the group responsible for the attack, has targeted governmental organizations and government contractors since at least 2010. The organization is known for using vulnerabilities sold in Black Hat hacking circles, and taken from Hacking Team leaks. The cyber espionage group BlackTech, which… Читать далее »

How to improve Apache server security by limiting the information it reveals

Автор: | 02.03.2018

Image: Apache If you administer the Apache web server, you know there are quite a lot of things you can do to help improve its security. For example, you could (and should) employ mod_security. You could also hide directory folders, run only necessary modules, limit large requests, restrict browsing to specific directories, and so much… Читать далее »

Key choices in cloud disaster recovery

Автор: | 24.02.2018

Only the luckiest IT professionals will go through their careers without experiencing a major systems failure, outage or other incident that forces them to invoke a disaster recovery (DR) plan. By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers. You also agree… Читать далее »

Why it may be time to approach desktop IT in a different way

Автор: | 17.02.2018

For almost two decades, the dominant desktop operating system in enterprise IT has been Microsoft Windows.  Windows remains cemented in the enterprise mindset, even though user or client-side computing is a world apart from the desktop IT of the late 1990s.  By submitting your personal information, you agree that TechTarget and its partners may contact you… Читать далее »