If your laptop is running either the Ultimate or Enterprise editions of Windows 7 or Windows Vista, you can take advantage of the BitLocker feature to encrypt the hard drive.
Marketing guru Andrew Lock interviews the CEO of MemberGate, the premiere membership website, plus tips on creating a loyalty program for your best customers.
Today's server hardware is so powerful that quite often we find stand-a-lone SMP (Symmetric Multiprocessing Machine) servers in different clustered and non-clustered configurations. Learn how to expand this type of system with additional hardware and DB2 UDB EEE database partitions.
Netflow has changed since Cisco first introduced it. To get the maximum security benefit from this useful protocol, make sure collectors operating on your network are able to collect, analyze and store Flexible NetFlow templates and data.
For smaller setups and times when you don't need server-to-server tunnels, OpenVPN may do the trick. But where do you turn when you need cross-platform security without any performance compromises?
OS Roundup: So says the International Intellectual Property Alliance, a group of trade bodies that includes the MPAA and the RIAA. In its eyes, countries that encourage the use of open-source software are in the same league as those with rampant copyright piracy.
OS Roundup: So says the International Intellectual Property Alliance, a group of trade bodies that includes the MPAA and the RIAA. In its eyes, countries that encourage the use of open-source software are in the same league as those with rampant copyright piracy.
<b>Groklaw:</b> "The judge said what SCO told the jury was inappropriate, and he merely warned SCO not to go "close to the line again." I'm sure SCO will mend its ways immediately."
<b>Standards Blog:</b> "While CIA Agent Carl Cummings was being taught to heel, Frank was sitting at his kitchen table, tapping away at the cramped keyboard of a cheap netbook connected to a neighbor’s unsecured WiFi network. Even this was risky, he reminded himself, so this brief session would have to be his last until he moved on."
Hackers and e-crooks have moved beyond the low-hanging fruit of online banks and eBay as primary targets for their elaborate phishing schemes, according to a new report.
Cheap laptops are easy to find, but an affordable notebook computer with both style and substance is a terrific find for any small business owner. The ThinkPad Edge does not disappoint.
After a security researcher demonstrated a security flaw in Apple's Safari browser running on its Snow Leopard operating system, the company has issued a fix, providing clues as to the nature of the threat.
Many Oracle database administrators would not only like to report on (ORA-) errors but also manage the alert log itself--saving and/or trimming the alert log, aka alert log rotation. Oracle's new ADR with command interface can easily be used to help rotate Oracle's alert log.
Oracle focuses on the default settings for just about all of the security setup in "The Oracle 2-Day Security Guide". As we draw near the close of the book, we'll examine a few guidelines for auditing.
Maverick marketer and eBay expert Andrew Lock shares his favorite eBay marketing tool. Plus, time-saving tips and a CRM program to boost your business.
<b>Good Gear Guide:</b> "Motorola will start loading Microsoft's search and map services onto its Android smartphones in China, bringing more non-Google services to the phones amid a row between Google and China"
<b>Datamation:</b> "A thin client is a computer system used to run applications where most of the actual processing is done on a remote server linked over a network."
Providing wireless access means updating, configuring and managing two to three times more devices than in a traditional infrastructure. Choosing the right wireless management products is key.