The LMS servers and curriculum have won several awards for innovation and administration (Under TTC Shelbyville)-
Tennessee College of
2014 InfoWorld Technology Leadership Nominee
Hits | SV (NI)
- 2,207,037 hits
Steve’s FavoritesMicrosoft Answers -
Ask Questions-Get Answers
ARS Technica' Blog
Bill Mullins' Blog
Bits of Bytes' Blog
Brickhouse Labs is committed to learning, teaching and deploying all things technology. Coolest Gadgets
What's On My PC
- GUI Maintenance Program for MySQL / MSSQL and Windows
- Defrag multiple drives at the same time
- (In My Opinion) – Best Dedicated Photo Resizer Out There
- A 5 Stars Windows Repair Utility
- Can’t uninstall a program?
- Reset Windows Updates
- Truly reset the TCP/IP stack
- Set your time using the net time command
- Test Your Hard Drive Speed With Windows 7's Device Manager
- Rufus USB boot and Hiren's Boot ISO
- What is core parking and should you adjust it?
- Realtek PCIe GBE Family Controller performance issues
- Commands in Telnet - DD-WRT and Tomato routers
- Release Mouse From VirtualBox
- See What Ports are Open on Your Computer and What is a Port Number?-Updated
- NTop for Windows
- Why Do You Subnet?
- HD Tach - A good measurement tool for HDD/SSD
- CVE-2014-3586 (jboss_enterprise_application_platform)The default configuration for the Command Line Interface in Red Hat Enterprise Application Platform before 6.4.0 and WildFly (formerly JBoss Application Server) uses weak permissions for .jboss-cli-history, which allows local users to obtain sensitive information via unspecified vectors.
- CVE-2014-5361 (landesk_management_suite)Multiple cross-site request forgery (CSRF) vulnerabilities in Landesk Management Suite 9.6 and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) start, (2) stop, or (3) restart services via a request to remote/serverServices.aspx.
- CVE-2014-5370 (blue_dragon)Directory traversal vulnerability in the CFChart servlet (com.naryx.tagfusion.cfm.cfchartServlet) in New Atlanta BlueDragon before 184.108.40.20627 allows remote attackers to read or possibly delete arbitrary files via a .. (dot dot) in the QUERY_STRING to cfchart.cfchart.
- CVE-2014-8111 (tomcat_connectors)Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.
- CVE-2014-8125 (drools, jbpm)XML external entity (XXE) vulnerability in Drools and jBPM before 6.2.0 allows remote attackers to read arbitrary files or possibly have other unspecified impact via a crafted BPMN2 file.
- CVE-2014-3586 (jboss_enterprise_application_platform)
- Android anti-virus antivirus apple Business cloud computing College Computer computer hardware computer repair Computers computer security computer technology Computer Utilities downloads Droid Education facebook Firefox freeware google hackers Hacking Hardware higher ed higher education Information Technology Internet Internet Explorer internet security iPad iphone IT K-12 laptops Law Life Linux mac Malware Microsoft microsoft office microsoft windows microsoft windows 7 network networking Network Security News PC School Security Server 2008 Software spyware TBR Technology Tennessee Ubuntu VirtualBox virtualization Virus Viruses Vista web Web 2.0 Windows windows 7 Windows 8 windows server windows utilities Windows Vista Windows XP Wireless wireless networking XP
- RT @Wilton_Tools: Thanks to Tim & students at @tcatshelbyville for their contribution to the Welding Industry! #NationalWeldingMonth http:/… 2 days ago
- Learning never stops #TNReconnect - May 15th deadline. 3 days ago
- Carl Marshal, alumni-earned his CEH, Carl graduated @tcatshelbyville, earned his B.S. now is working on his masters. http://t.co/KNYtLwsfWV 3 days ago
- Check out our instructor interviews on Youtube - youtube.com/channel/UCjapg… http://t.co/LGg0852MBe 5 days ago
- Schedules - tcatshelbyville.edu/tn-promise-tn-… http://t.co/ajnG53ITGk 5 days ago
Tag Archives: information systems
So you started your IT career and you landed in a help desk position. What now? We wrote an article, “It takes time in the trenches of help desk” that tells you to do your time. … Continue reading
Years ago we made a list of phrases we’ve heard in IT. These are phrases you may hear in the server room or when someone is on the phone with end-users. “Try it and see…” “Who knows?” “Reboot it” … Continue reading
According to the Bureau of Labor Statistics, the computer industry is growing at an all time high. With hands-on skills, experience, certifications and continuing education, a majority of companies will hire skilled employees without a B.S. degree. We … Continue reading
Do you have devices such as a NAS, Firewall or other device on your network that will only work in IE? Josh gave me a reminder of just how powerful Chrome can be if you load the IE Tab … Continue reading
“Somewhere in our pasts, however dormant, however dulled that ember now is, there is a belief that IT can actually make things better through change,” McCartney said. “That’s the Tantalus theory: that’s the opportunity held before us.” McCartney has done … Continue reading
Several years ago I wrote an article titled the same as this article. I love teaching information technology. But there are days I wonder if I can keep up. Help desk personnel and junior administrators have to be well … Continue reading
Establishing a Career Path in Information Security – Certification Magazine. Question: I have completed my degree in IT. I want to pursue a career in information security. Which path should I follow? I have done Java. Should I go for the … Continue reading