Tag: security

Ask a question

Join Now or Sign In to ask a question.
ttopp
11 hours ago

When I’m using open WiFi networks for anything more than a quick bit of casual browsing, what steps are necessary to stay secure?

ttopp
11 hours ago

When I’m using open WiFi networks for anything more than a quick bit of casual browsing, what steps are necessary to stay secure?

MGaluzzi
16 hours ago

The options for protecting against DDoS attacks basically comes down to a hardware based or cloud based solution. Hardware is the traditional way and if...

SilverHawk
16 hours ago

After years of the wireless industry arguing against having kill switches in smartphones and opposing regulations that would mandate it, there was an...

cchecca
1 day ago

All of the recent security issues in the news makes me curious - How much are my personal details and information worth in real dollars? Is there an actual...

1 Answer |
delia25
2 days ago

I understand that using unsecured public WiFi is a security risk, and if I’m not using a VPN, someone can “eavesdrop” on my activity. What I don’t know is...

2 Answers |
ernard
2 days ago

I understand zero day to mean that there is a serious security issue, but I don’t know what it actually means. Where does the term “zero day” come from?

pwarren
3 days ago

Like everyone else, I’ve heard a lot about OpenSSL since the Heartbleed security flaw was discovered. I understand that it is intended to encrypt website...

Tags: Heartbleed, OpenSSL |
2 Answers |
rtrembley
3 days ago

Whenever I enter my password, I get an error message that says “This Apple ID has been disabled for security reasons.” I think my youngest daughter tried to...

Tags: apple, Apple ID, security |
1 Answer |
rtrembley
3 days ago

Whenever I enter my password, I get an error message that says “This Apple ID has been disabled for security reasons.” I think my youngest daughter tried to...

Tags: apple, Apple ID, security |
1 Answer |
Users of Google Glass will get to meet and compare their techie headgear this weekend at a spot where appearance is everything.
Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
A Space X Falcon rocket lifted off Friday afternoon for the International Space Station (ISS) from the Cape Canaveral Air Station in Florida.
Advanced Micro Devices doesn't want its chips in low-priced tablets, and is eager to avoid a battle with Intel or ARM, whose chips have driven tablet prices down to under US$100.
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
Tech workers suing over an alleged no-poaching agreement among Silicon Valley firms are fighting an attempt by defendants to ban evidence that might portray Steve Jobs as a bad guy.
Almost 500,000 patient records have been hacked from the servers of the Harley Medical Group, the plastic surgery firm which has clinics across the UK.
The U.S. Federal Communications Commission will reserve a significant amount of spectrum in its upcoming auctions of the television band for unlicensed uses such as Wi-Fi, agency officials said Friday.
Can plastic materials morph into computers? A research breakthrough published this week brings such a possibility closer to reality.
Even four months after the Mac Pro's initial release, Apple appears to be having problems making enough of the high-end cylindrical desktop computer. The company's store currently shows shipping times of 4-5 weeks for all Mac Pro models, even the stock versions without additional customizations.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

White Papers & Webcasts

See more White Papers | Webcasts

randomness