Search

Results 1561-1580 of 1797 for Jack M. Germain.

IM at Work, Part 2: Tools for Locking Down

Letting employees have unbridled access to free, consumer-level instant messaging applications running on their workplace computers is a security disaster waiting to happen. Instant messaging applications are easy targets for hackers taking advantage of vulnerabilities. It is critical for businesses...

BEST OF ECT NEWS

Is Internet Franchising a Sure Thing?

Looking for a franchise opportunity? The World Wide Web is overflowing with Internet-based businesses for sale. Searching for "Internet Franchising" in your favorite search engine will reveal dozens of Web sites promising both online business and franchise opportunities in a variety of Internet-base...

BEST OF ECT NEWS

The Resurgence of Open Source E-Commerce Apps

In the years leading up to the dot-com bust, the Internet was unchartered turf to which countless entrepreneurs flocked in pursuit of easy money. Just like the Gold Rush of the Old West in the 1800s, the dot-com business surge had its fling and then fell off. Just like the rise of the Old West to a ...

New Trend Micro App Sounds Alarm on Shady Web Sites

Security firm Trend Micro has released TrendProtect, a free browser plug-in that alerts computer users to unsafe Web sites that contain unwanted content and hidden threats. The free download is designed to help consumers and business Web surfers avoid an alarming number of Web sites infected with ma...

IM at Work, Part 1: Idle Chatter, Serious Risk

Consumer-grade instant messaging applications such as Yahoo Messenger, AOL Instant Messenger and Windows Live Messenger can become significant security holes when used by workers on corporate networks. Instant messaging applications are easy targets for hackers taking advantage of vulnerabilities. I...

Untangle Platform Ties Apps Together for Network Virtualization

Untangle launched on Tuesday an open source network gateway platform to stop spam, spyware and virus attacks for small and medium-sized businesses. The Untangle Gateway Platform is based on technology that virtualizes the network stream. It is built around more than 30 best-of-breed, open source pro...

Kace Extends App Management Tools for Computer Administrators

Systems management appliances provider Kace announced on Monday the integration of the recently acquired AppDeploy Live service with its Kbox Systems Management Appliances. The launch provides system administrators with access to two global communities of information to speed day-to-day maintenance ...

Boutique Malware: Custom-Made for the Executive Suite

A sophisticated group of spammers has been targeting since late May high-salaried workers at selective corporations in a spam attack using e-mail disguised as messages from the Better Business Bureau, the Internal Revenue Service and the Federal Trade Commission. A fourth variation of the spam attac...

Linux Devs, Architects Talk Open Source at Collaboration Summit

Key kernel developers and more than 230 Linux leaders participated last week in the first Collaboration Summit hosted by the Linux Foundation to discuss solutions for the most pressing issues facing greater Linux adoption. The nonprofit Linux Foundation, dedicated to accelerating the growth of Linux...

Disasters and SMBs: Plan to Survive, Don’t Fail to Plan

Small businesses, beware. Can your business survive a natural disaster? Chances are against your survival if you do not have a recovery and continuity plan in place. A national survey conducted by custom market information company TNSInfo reveals that many small businesses would not survive a natura...

Performance Technologies Broadens Embedded Linux Product Line

Rochester, N.Y.-based Performance Technologies announced Tuesday additions to its NexusWare Linux-based operating system and development environment to include support for a wide range of single board computer hardware offerings. The release of NexusWare version 12 expands Linux support to include b...

The Shrouded Sharing Shenanigans of P2P Programs

People who use popular file-sharing software at home, in school and in the workplace to download music and videos are likely to expose their own personal and corporate data stored on their computers' hard drives. The ability of peer-to-peer software to hunt for and grab personal and corporate inform...

PRODUCT REVIEW

SpaceTime Browser Adds New Dimension to Search

An innovative three-dimensional search program puts a unique spin on Internet searching. All results are displayed in a 3-D space that users can navigate and manipulate. SpaceTime presents all search results, shopping windows and browsing activity in a continuous 3-D stack that merges results to sav...

Big Pirate on Campus

A Congressional committee last month gave universities with high volumes of student piracy violations 30 days to return a survey on Internet piracy and network practices. The committee is scheduled to resume its meetings Tuesday in Washington. The letter hints that Congress is stepping up its crackd...

Fedora 7 Tips Hat to Developers

Red Hat's Fedora Project has released the Fedora 7 version of the Linux operating system, which features a new build capacity allowing for the creation of custom appliances to meet individual needs. Fedora 7 offers users an appliance development platform that it says is 100 percent open source, with...

Open Source and the DMCA: What Hath Digg Wrought?

The flap erupted earlier this month. The Motion Picture Association of America started sending Digital Millennium Copyright Act requests to Digg.com and a slew of other popular blogging sites on which users had posted a 32-hexadecimal digit code, a processing key that could be used to circumvent DRM...

House Bill: Spyware Solution or Limp Legislation?

Antispyware legislation awaiting Senate action offers little promise of meaningful prosecution against violators, said Ron O'Brien, a senior security analyst with antispyware firm Sophos. The U.S. House of Representatives has passed an antispyware bill that would impose specific penalties for scamme...

The Net Generation Goes to College

Turn on your monitor and boot up your computer, because class is in session. Many college students now raised on the Internet and mobile devices will not be limited to sitting in traditional "brick-and-mortar" classrooms as schools look to the latest offerings in virtual technology and Internet broa...

The Image Spammer’s New Bag of Tricks

Senders of unsolicited electronic messages, also known as spammers, are deploying a new generation of image spam to outsmart e-mail filters and other technologies designed to thwart them. They're cutting corners by linking their spam message to a photo from a popular image-hosting site, instead of s...

BEST OF ECT NEWS

Consumer Electronics: Closing In on Linux

Chances are that one or more of your consumer products uses the Linux operating system. In order to find out, you'll have to look at the fine print. Manufacturers do not openly advertise with labels announcing "Linux Inside." Linux has steadily become the operating system of choice by manufacturers ...

How often do you receive an email that you suspect is fraudulent?
Loading ... Loading ...

LinuxInsider Channels