Latest posts

Page 7

Third party patch and vulnerability roundup – May 2014

  Please note that the roundup covers updates issued between May 1 and the time of this writing, which is May 27.

Continue reading

How we patch: by the numbers

We all know how important it is to keep current with security updates, a.k.a. patches – but how many organizations are really following best practices?  As attackers get more sophisticated and researchers become more diligent, vulnerabilities in popular software – from operating system to end-user applications and even including security software – are discovered every […]

Continue reading

Manual invoicing’s affordable (and efficient) alternative

Car maintenance, electrical repairs and, as Bruce Springsteen once famously sang, “Working on the highway” are important jobs that require manual effort. Invoicing customers? That’s one job that no longer needs to be manual – though this labor-intensive task remains quite common in small to mid-sized businesses.

Continue reading

How to destroy your IT career in five easy steps

You probably heard about the (former) PayPal executive who went on a Twitter rampage one Friday night and fired off a bunch of nasty tweets about the people he worked with, after which his two-month-old career at that company not-unexpectedly ended. Although the exec in question later offered the excuse that a new phone was […]

Continue reading

What’s your sign? The sys admin’s zodiac

Sys admins, alchemists, astrologers… all three jobs seems to be part fantasy and part mythology to people who don’t do the job. The subject came up around the table recently and we started to compare the traditional traits of the various Zodiac signs to those of the typical sys admin role and character. Of course, […]

Continue reading

How to simplify vulnerability assessment on network devices [Infographic]

When we talk about vulnerability assessments, we most like think of operating systems, applications, laptops, workstations and servers, yet network devices are often overlooked. And that could become a problem. That is why it’s important to have a tool which scans your network and does a full vulnerability assessment of all your software and hardware. […]

Continue reading

Hoopy froods unite – 77 great quotes for Towel Day

Happy Towel Day, fellow hitchhikers. And if you happen to be a strag*, we hope you have found your towel. ‘What is it with towels?’ you may ask. Fans of the ultra geeky, ultra absorbing The Hitchhiker’s Guide to the Galaxy will know that Douglas Adams had a few things to say on the subject […]

Continue reading

If it’s free, you’re probably the product

Free email, free accounts, free storage, free software, free hosting, free this, free that, free the other. “There’s no such thing as a free lunch”. Companies plying their wares on the Internet are not charities. They are trying to make a profit. And there is nothing wrong with that. Everyone has to pay their bills, […]

Continue reading

On the beat: 1,000 Megabits per second!

These days, “do it yourself” is commonly associated with home improvement projects. Well, why not Internet service?

Continue reading

The Dumbing-down of Software (There’s an App for That)

Some tech pundits have long bemoaned the phenomenon of software bloat – increasingly sophisticated and consequently increasingly complex applications that can contain hundreds of thousands or even millions of lines of code. Microsoft Office is a favorite target of these complaints, with between 25 and 50 million lines of code.

Continue reading