The LMS servers and curriculum have won several awards for innovation and administration (Under TTC Shelbyville)-
Tennessee College of
2014 InfoWorld Technology Leadership Nominee
Hits | SV (NI)
- 2,183,074 hits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Bits of Bytes' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
- SoftPerfect Free Software
- 4 Exabyte download coming soon?
- Superfish, Komodia, PrivDog vulnerability test
- Three Must Have Diagnostic Tools by Windows Sysinternals
- Never stop growing
- SSD drive with Intel chipset – Performance is in RST
- Stop sponsor offers during your next Java Update
- uTorrent mining Bitcoins?
- Test Your Hard Drive Speed With Windows 7's Device Manager
- Rufus USB boot and Hiren's Boot ISO
- Realtek PCIe GBE Family Controller performance issues
- What is core parking and should you adjust it?
- Speed up Chrome with a ram disk
- Commands in Telnet - DD-WRT and Tomato routers
- Export VMWare Player's Virtual Machines to an OVF file
- Defending your network with Snort for Windows
- Red X on network icon - Windows 7
- Release Mouse From VirtualBox
- CVE-2013-2184 (movable_type)Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.
- CVE-2013-6501 (php)The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
- CVE-2013-7437 (potrace)Multiple integer overflows in potrace 1.11 allow remote attackers to cause a denial of service (crash) via large dimensions in a BMP image, which triggers a buffer overflow.
- CVE-2013-7438 (pbm212030)Multiple buffer overflows in pbm212030 allow remote attackers to cause a denial of service (crash) or possible execute arbitrary code via a crafted PBM image, related to (1) stream line data, which triggers a heap-based buffer overflow, or (2) vectors related to an "internal intermediate heap-based buffer."
- CVE-2014-3619 (glusterfs, opensuse)The __socket_proto_state_machine function in GlusterFS 3.5 allows remote attackers to cause a denial of service (infinite loop) via a "00000000" fragment header.
- CVE-2013-2184 (movable_type)
- Android anti-virus antivirus apple Business cloud computing College Computer computer hardware computer repair Computers computer security computer technology Computer Utilities downloads Droid Education facebook Firefox freeware google hackers Hacking Hardware higher ed higher education Information Technology Internet Internet Explorer internet security iPad iphone IT K-12 laptops Law Life Linux mac Malware Microsoft microsoft office microsoft windows microsoft windows 7 network networking Network Security News PC School Security Server 2008 Software spyware TBR Technology Tennessee Ubuntu VirtualBox virtualization Virus Viruses Vista web Web 2.0 Windows windows 7 Windows 8 windows server windows utilities Windows Vista Windows XP Wireless wireless networking XP
- TN Reconnect open house at TCAT-S a success - goo.gl/0DtL8a http://t.co/MAwnJObuSl 1 day ago
- TN Reconnect news article t-g.com/story/2180068.… 2 days ago
- Times-Gazette pictures from TN Reconnect open house t-g.com/gallery/tcat-r… 2 days ago
- Sign up today - tnreconnect.gov/grant.shtml http://t.co/NWLAsI9eXL 3 days ago
- RT @TCATLivingston: 1 reason people don't go back to school, $$$. #TNReconnect and 27 TCAT's are removing that problem. Visit a TCAT tomo… 3 days ago
Tag Archives: Business
BYOD (Bring your own device) is a great concept and it can work. I recently read an article on an opinion that made mereally think of how some look at this concept and its security as though the IT pros … Continue reading
Some experts say existence of complex credit card fraud black market a sign that PCI isn’t effectiveFBI Credit Card Ring Bust Exposes PCI Challenges – Dark Reading.
The U.S. Federal Trade Commission (FTC) has charged two businesses with illegally exposing the sensitive personal information of thousands of consumers by allowing peer to peer file-sharing software to be installed on their corporate computer systems…Privacy hackers | Homeland Security News Wire. The … Continue reading
Just saw a student’s post on an add-on you can get for Chrome. Adam shared a link to Collusion for Chrome at Chrome’s webstore. This add-on compiles information from the websites that bind to one another and builds a graph … Continue reading
Here’s 10 things the younger generation is doing online and how they can stop behavior that can lead to malicious theft of data and great food for thought about their online reputation. 10 things Gen Y do online.. and shouldn’t. … Continue reading
The latest generation of desk-jockey’s admitted in a recent CISCO study that they frequently ignore and/or circumvent the information technology (IT) policies of their employers, heightening corporate risk. The ISCO Connected World Technology Report surveyed some 2,800 college students and young … Continue reading
“iPads pose the worst risk as far as data leakage in concerned since they are mainly used for consumption of enterprise information in various form of documents,” says Guy Levy-Yurista, vice president of products and development for AirPatrol. “This sensitive … Continue reading