-
+10 +2
A government surveillance bill by any other name is just as dangerous
The CISA ‘cybersecurity’ bill is really a way to blow another massive hole in Americans’ privacy. By Trevor Timm
-
+10 +3
On ethics in information technology
Our field requires ethical frameworks we accept, instead of rules that remain technically unbroken while we hackers violate their spirit with as much ingenuity as we can muster.
-
+15 +1
Coolest jobs in tech (literally): running a South Pole data center
You know it's cold when you have to heat the air used to cool your data center.
-
+1 +1
Getting Started With The Spark Framework on Plesk 12 • Conetix
In the world of web application development, especially rapid web application development, the names you usually hear of are PHP, Ruby, Ruby on Rails, Python...
-
+18 +1
Passphrases That You Can Memorize — But That Even the NSA Can't Guess
It’s getting easier to secure your digital privacy. iPhones now encrypt a great deal of personal information; hard drives on Mac and Windows 8.1 computers are now automatically locked down; even Facebook, which made a fortune on open sharing, is providing end-to-end encryption in the chat tool WhatsApp. But none of this technology offers as much protection as you may think if you don’t know how to come up with a good passphrase.
-
+3 +1
Two weeks on, Superfish debacle still causing pain for some Lenovo customers
Based on the experience of Ars readers Chai Trakulthai and Laura Buddine, Lenovo overstated both assurances. The pair recently examined a $550 Lenovo G510 notebook purchased by a neighbor, and their experience wasn't consistent with two of Lenovo's talking points.
-
+18 +1
OpenSSL patches eight new vulnerabilities
Server administrators are advised to upgrade OpenSSL again to fix eight new vulnerabilities, two of which can lead to denial-of-service (DoS) attacks.
-
+3 +1
Bad, bad Internet news: Internet Systems Consortium site hacked
The ISC site, home to the world's most popular Domain Name System program BIND, appears to have been infected with malware.
-
+1 +1
.NET Framework All Versions Offline Installers Direct Download Links
.NET Framework runtime is a Microsoft product which is used to run the applications made with Visual Studio using this framework. If you read the system re
-
+2 +1
Conetix Network Operations Centre Build Part 1 - The Hardware
One of the key requirements to running a great platform is ensuring that it’s running optimally. To do this, detailed monitoring is required and it...
-
+3 +1
Seagate’s new 8TB hard drive is for all you digital hoarders
3.5" drive hits the enterprise first, but consumer versions will surely follow.
-
+31 +3
In sudden announcement, US to give up control of DNS root zone
In a historic decision on Friday, the United States has decided to give up control of the authoritative root zone file, which contains all names and addresses of all top-level domain names.
-
+2 +1
Generate Self Signed Certificate for Demo Purposes
ADdict - Generate Self Signed Certificate for Demo Purposes
-
+12 +1
Best Free Windows Admin Tools - 4sysops
Free Admin Utilities
-
+12 +1
Windows PowerShell Survival Guide
PowerShell is a vast product, especially when you take into account how it's used in other products such as Lync Server, Exchange, and the Windows Operating System. It can be a little daunting to those new with PowerShell - there is a vast array of deeply technical discussions of all of PowerShell's many aspects, quirks and peculiarities and all.
-
+17 +2
Se* and you
Inspired by GRSecurity‘s analysis of the Linux capabilities model, I thought I’d take a quick look at how Windows fares. The following is a brief analysis of the threats associated with each Se* privilege.
-
+13 +1
How to take Screenshots on Microsoft Surface
The Touch cover and Type cover don't have a print screen button. So how do you take a screenshot?
-
+12 +1
Regular Expressions Cheat Sheet
Regular Expressions Cheat Sheet from DaveChild. A quick reference guide for regular expressions (regex), including symbols, ranges, grouping, assertions and some sample patterns to get you started.
-
+15 +2
Stop and restart apps properly in Windows 8.1
To close an app in Windows 8 all you need to do is drag it to the bottom of the screen. In Windows 8.1, Microsoft made a small change. While you can still close the app in this way, removing it from view, this method doesn’t stop all of the processes associated with the app.
-
+20 +1
Know your Windows Processes
I have been talking with quite a few people lately tasked with “security” inside their organizations and couldn’t help but notice their lack of understanding when it came to Windows process information.
Submit a link
Start a discussion