- Core IT
- Business & Money
- Personal Tech
Member since: August 2011
Areas of Interest:
- Go to the Store menu at the top of your display, then just select Authorize Computer. That should do it.
4 days 19 hours ago
- StillADotcommer answers Re: Would it help IT security to replace the term “cloud” with “someone else's computer?”It’s not going to happen, but actually, yeah, I do think it would help clarify the concept in some ways. It makes it clear that you are putting a lot of trust in “someone” else (corporations are people, my friend). It also might encourage people to consider encrypting their own data instead of hoping the “someone else’s computer” is secure.
4 days 19 hours ago
- StillADotcommer answers Re: What happens to BlackBerry now that takeover falls through and CEO Thorsten Heins is forced out?Who knows...they have a miniscule and falling market share. The most recent versions of their products have failed to attract attention, even though they boast decent hardware and software, and they have nothing on the horizon to change the direction of this sinking ship.
4 weeks 4 days ago
- StillADotcommer answers Re: How can a computer virus be transmitted over the air from machine to machine?There is apparently significant and growing skepticism that badBIOS is real. Other researchers have been unable to confirm the original findings. The original researcher, Dragos Riui, stands by it however. Source: http://arstechnica.com/security/2013/11/researcher-skepticism-grows-over...
4 weeks 4 days ago
- Oracle University would be one choice. http://education.oracle.com/pls/web_prod-plq-dad/db_pages.getpage?page_i...
5 weeks 2 days ago
- StillADotcommer answers Re: How are you developing social, mobile, analytics and cloud skills at your organization?Well, first off, your link doesn’t link to what you said, it’s just some three sentence “quick post” by a different guy with one of those sentences being, “good read.” Secondly, this is a question that would require a white paper to really answer appropriately.
5 weeks 2 days ago
- It seems like an annual ritual now for some Senator and/or Congressman to reintroduce CISPA, the NSA friendly legislation to make it easier for the government to get personal information from private companies. The director of the NSA was calling for CISPA just a few weeks ago. For the children. Senators Chambliss and Feinstein obliged.
6 weeks 5 days ago
- StillADotcommer answers Re: Has Yahoo made a poor business decision by essentially banishing tumblr adult content?I doubt it will hurt them, really. The people who get fired up over freedom of speech issues online and prudish censorship by companies aren’t going to be using much Yahoo has to offer anyway. Come to think of it, I couldn’t really tell you exactly what it is that Yahoo offers to users. A second rate email service, I guess.
19 weeks 6 days ago
- The German Minister of the Interior issued a public statement that Germans who were concerned about privacy should avoid using anything that runs on US servers. In other words, yes, I think it will impact American business. And perhaps it should.
21 weeks 6 days ago
- Nothing good. Any newly identified vulnerabilities will not be patched for starters. Time to move on. http://www.microsoft.com/en-us/windows/business/retiring-xp.aspx
22 weeks 6 days ago
- StillADotcommer answers Re: Will reports of how easy it was for GCHQ to intercept BlackBerry devices hurt the company?2009 was four years ago, an eternity in the development of mobile applications and OSes. I don’t know how much what happened then reflects the current situation. I know that BB has agreed to grant governmental agencies access to BBM in the past (India?), as a requirement of doing business there.
24 weeks 5 days ago
- It’s possible using a rooted android device. Android = creeper friendly! http://galaxy-note2.wonderhowto.com/how-to/save-snapchats-secretly-onto-...
25 weeks 5 days ago
- Why not set set up your laptop to take photos of anyone who opens it, You can install Yawcam (open source, free) then review the images taken by the camera.
28 weeks 3 days ago
- There is a good white paper about defeating script injection attacks that you might find interesting/useful, although it is a few years old now.
30 weeks 3 days ago
- There are a few benign ways to do it without causing any harm. One thing you can do is redirect all his traffic to a cat website, which judging by your avatar should make it clear that you are the puppet master pulling his strings. This site will walk you through it step by step, along with some other fun things you can do.
30 weeks 5 days ago
- StillADotcommer answers Re: Why is broadband access and speed in the US so bad compared to other countries?Part of the answer is that AT&T spent $17,430,000 on lobbying politicians in 2012 to help make sure they don't have to provide decent broadband services due to "socialist" regulations.
34 weeks 3 days ago
- A few basic steps can help prevent a lot of issues: Do code reviews so that there everything changed is double checked and looked at with a fresh set of eyes. Don't allow escape characters. Use parameterized statements so that data is filtered prior to being sent to the database.
35 weeks 2 days ago
- You could use Microsoft Process Monitor. It may be overkill for your needs, but it's worth checking out. Here is the link to the description and download.
36 weeks 5 days ago
- This week Andrew Auernheimer was sentence to 41 months (!) in prison for exposing an AT&T security flaw.
37 weeks 5 days ago
- I assume you saw a piece about the ring Google showed at the RSA conference. The way I understand it, Google is using the ring to authenticate the USB token in a USB dongle, so the actual token isn't wearable in this example.
38 weeks 4 days ago
- When I occasionally want to watch streaming video that is region locked I just use a VPN. It doesn't always work that well though - higher quality video often stutters and stops. A VPN can work, but don't expect it to always work perfectly. The other way to go is to use one of the DNS services like Tunlr or UnoDNS.
39 weeks 6 days ago
- Use a VPN for starters. There are a number of free VPN services out there, but you might want to consider paying for additional privacy and less ads. This should do a pretty good job of keeping you out of the crosshairs of your ISP by making it pretty much impossible for them to see that you are using something like BitTorrent.
40 weeks 4 days ago
- Most people thing of keyloggers as malicious software, but don't forget about hardware keyloggers that can be plugged into a USB port. Obviously these are easy to detect on a laptop, but on a desktop they could potentially go unnoticed for months.
41 weeks 2 days ago
- At my office, we have two people with management oversight, and they have very different approaches. One is pretty easy-going, assigns tasks and expects them done on time.
41 weeks 6 days ago
- What I would like to know is how you are finding SMP PREEMPT? Are you using terminal emulator to access Linux command line shell, or is this displayed on the version of Android your phone is running (you didn't mention Android, but it must be)?
42 weeks 6 days ago
- 1 of 2
Follow other ITworld members or sign in with your Facebook account in order to view your friends' activity.