Profile

Jay-Ar Rivera
Member since: January 2013
Areas of Interest: Cloud Computing, Hardware, Mobile & Wireless, Networking, Software, Virtualization
Activity
No records.
Friends' Activity
-
Bash has quietly made scripting on Unix systems a lot easier with its own regular expressions. If you're still leaning on grep and sed commands to get your scripts to do what you need from them, maybe it's time to look into what bash can do on its own.
4 days 7 hours ago
-
AV companies have been at war with the bad guys for much of the last two decades. And guess what? The bad guys won. Now that the days of antivirus software being in the front line of defense against malware are over, what companies are ready to step in and take up arms against sophisticated attacks and malware? Here are five to keep your eye on.
6 days 12 hours ago
-
Cron is not in charge; you are. All you need to do is tell it what you want done and when you want it done.
1 week 4 days ago
-
Don't let an ISO 27001 audit ruin your week. Chin up and follow some simple rules to chase away the pain and the worry.
2 weeks 4 days ago
-
As chaos reigned in the hours after twin explosions at the finish line of the storied Boston Marathon, social media outlets became a lifeline between runners, spectators and the outside world.
3 weeks 2 days ago
-
Sandra Henry-Stocker wrote Unix: Cheat sheets -- everything you wanted to know about everything ... almost A treasure trove of cheat sheets is yours for the clicking. Visit OverAPI.com for help with nearly any language or tool imaginable.3 weeks 4 days ago
-
The IRS is scaring taxpayers silly this season with boasts about its Big Data prowess and 'robo audits.' But recent reports suggest the agency is struggling to keep its IT operations afloat.
4 weeks 17 hours ago
-
A number of people have asked recently what it takes to be a Unix systems administrator, what “core competencies” are required, and what are the best and worst aspects of the job. Here are some answers that might work once we get beyond “it depends”.
4 weeks 4 days ago
-
With the federal government proposing airplane style "black boxes" in every automobile, a crowd-funded project wants to design a lock that will allow car owners to secure their data from snooping and tampering.
5 weeks 3 days ago
-
Are you someone who never met a Unix command you didn't like? OK, maybe not. But are there commands you just can't imagine living without? Let's look at some that have made a big difference on my busiest days and those that people I've worked with over the years have said are their most important essentials.
5 weeks 4 days ago
-
Microsoft's Windows operating system spent close to two decades as the 'problem child' of the IT world - ubiquitous, buggy and easy to hack. But this week brought more evidence that Google and its Android mobile operating system may be taking that mantle from the folks in Redmond, Washington.
6 weeks 1 day ago
-
While pipes are one of the things that make Unix such a powerful and versatile operating system, they don't always make sense. Many people still fall into the "useless use of a pipe" habit while still others use pipes in situations in which pipes simply don't function at all. Knowing when to pipe and when not to pipe remains a sign of Unix mastery. If you want to look Unix savvy, use pipes only when they provide a critical service and never when they're superfluous or downright wrong.
6 weeks 4 days ago
-
The U.S. military relies heavily on distributed, wireless networks to communicate in combat zones. Now DARPA is looking for ideas on how to keep enemies off these networks.
7 weeks 2 days ago
-
Finding a computer infection that is, above all else, designed to remain hidden is not easy work, but neither is it impossible. With some good insights and tools, you might just get a leg up on how the multi-billion dollar spyware industry is attacking your systems.
7 weeks 4 days ago
-
paulfroberts wrote PC cleanup scammer calls Microsoft Malware Protection Center expert. Hilarity ensues. What's a bad day for a scammer selling bogus Windows PC clean up services? How about accidentally dialing a guy who works in Microsoft's Malware Protection Center!8 weeks 3 days ago
-
You could have a rootkit infection right now and be totally unaware. One of the key goals of a rootkit is, after all, to go undetected. If the rootkit is hiding files, processes, logins, etc., how would you know? If you can't see it, how would you remove it?
8 weeks 4 days ago
-
A security researcher claims to have found five, new vulnerabilities in Oracle's Java technology that could allow a malicious hacker to bypass safety features in the latest version of the Java technology.
9 weeks 3 days ago
-
If you haven't worried about rootkits in a while, what are you waiting for? Rootkits remain one of the stealthiest and most worrisome forms of malware compromising systems today.
9 weeks 4 days ago
-
A steady drumbeat of news about sophisticated cyber attacks against our government and leading institutions has attendees at this year's RSA conference in a fever. And that may be bad for security.
10 weeks 3 days ago
-
As if you didn't know it already: antivirus software isn't doing its job, even though it sucks up around 30% of IT security budgets. But where can companies turn next? Two firms think they have an answer.
10 weeks 3 days ago
-
If you've ever wondered how Unix systems identify files, you might be surprised to learn that file names really aren't an important factor. Unix systems reach into files looking for special codes called "magic numbers" to figure out what your files really are. They also examine other file content to pick out additional details.
10 weeks 4 days ago
-
Malware represents one of the greatest threats that organizations face today and IT departments are coming to understand that their AV tools can only do so much to protect them. When malware is discovered on their systems, they want to know what it might have done, if the threat is still ongoing, and what they might have lost to the infection. Answers can be very tough to find, but reverse engineering the malware might just be the way to provide them.
11 weeks 4 days ago
-
paulfroberts wrote Security stories to watch: Security firm Bit9 hacked. Also: Microsoft megapatch and identity management The hack of security firm Bit9 reminds us that application whitelists work great at stopping malware ... until they don't. And: Microsoft prepares a mystery 'double patch' of the Internet Explorer web browser, fueling speculation.12 weeks 3 days ago
-
Don't throw up your hands if your boss won't buy you Tripwire and a modern debugger. There are a lot of things that your Unix system -- right out of the box -- can tell you about files and processes.
12 weeks 4 days ago
-
Last week's revelations about hacks of prominent media outlets continues. Plus: new questions about the security of encrypted communications will dominate the news this week.
13 weeks 3 days ago
- 1 of 4
- ››
Activity
- Comments: 0
- Friends: 0
- Likes: 0
- Following: 2
- Questions Asked: 0
- Followers: 0
- Questions Answered: 0












