- Note: Products that are reviewed (hardware or software) are personally owned or freeware that appear in this blog.
Top 50 Higher-Ed Blogs 2016
Hits | SV (NI)
- 2,659,699 visits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
Security Blogs The Hacker News Naked Security Threat Post Krebs on Security Tao Security Uncommon Sense Security Dark Reading
Daily Archives: Tuesday, October 25, 2011 1:08 am
How is your network card and computer routing? Use the following command to see the routing table – from the command prompt type – netsh interface ipv4 show route Publish Type Met Prefix Idx Gateway/Interface Name ——- ——– — ———————— … Continue reading
With workers bringing their own smartphones and tablets into the company, IT security needs to focus on creating a more secure environment, not on securing each device –Pocket Guide To Securing Mobile Devices – Dark Reading.
Damballa report shows seven new botnets among the top 10 largest; off-the-shelf construction kits dominate list. via DarkReading share– New Botnets Gaining Traction Across The Web, Study Says – Dark Reading.
Researchers say that the rootkit used in the TDL4 botnet has been partially rewritten in what appears to be an attempt by the creators to make it even harder to eradicate. via DarkReading Share –TDL4 Botnet Now Even Harder To … Continue reading