Search Results

Search found 25758 results on 1031 pages for 'oracle security'.

Page 765/1031 | < Previous Page | 761 762 763 764 765 766 767 768 769 770 771 772  | Next Page >

  • Solaris Is Dead. Long Live Linux

    <b>Linux Magazine:</b> "Hot on the heels of acquiring Sun, Oracle has changed the license for Solaris making it non-free once again. In a time like this, such a move can only be fatal and of course ultimately beneficial to Linux."

    Read the article

  • Secure Your Server with Denyhosts

    <b>Geekride:</b> "DenyHosts is a tool i use to secure my SSH server from these type of people. Written in python, this tool serves as a very active security guard and helps me to keep my system safe from lots of prying eyes."

    Read the article

  • Can't install Dual Boot from USB live - crash and nouvea problem

    - by user215064
    I just got a new laptop with Windows 8 pre-installed and I'm trying to make a dual boot with Ubuntu on my other hard drive but I can't make the Live USB work. I followed all the procedure for disabling the Security Boot and the UEFI setting but still doesn't work. It seems to start the installing procedure but I never get to choose anything: after a few seconds the screen turns black with an error message [18.707838] divide error: 0000 [#1] SMP (it goes on for several lines quoting some nouveau problem). Any ideas?

    Read the article

  • Most common Apache and PHP configuration for portable Web Applications

    - by Mahan
    I always create web application using PHP but I always distribute and deploy my works to different kinds of server platforms and web server configurations. Thus I always encounter problems in deployment because some features are enabled and others are disabled. And my question, is there a standard web server configuration that is commonly used by most of web servers worldwide? covering the aspects of reliability, security and maintainability?

    Read the article

  • Windows Azure from a Data Perspective

    Before creating a data application in Windows Azure, it is important to make choices based on the type of data you have, as well as the security and the business requirements. There are a wide range of options, because Windows Azure has intrinsic data storage, completely separate from SQL Azure, that is highly available and replicated. Your data requirements are likely to dictate the type of data storage options you choose.

    Read the article

  • The Hybrid Cloud: Having your Cake

    With a hybrid cloud, can you get the freedom and flexibility of a public cloud with the security and bandwidth of a private cloud? Robert Sheldon explains all the ins and outs. Free ebook "TortoiseSVN and Subversion Cookbook - Oracle Edition"Use these recipes to work better, faster, and do things you never knew you could do with SVN. If you're new to source control, this book provides a concise guide to getting the most out of Subversion. Download it for free.

    Read the article

  • Last Day At Sun

    <b>Wild Webmink:</b> "Today is my last day of employment at Sun (well, it became Oracle on March 1st in the UK but you know what I mean). I am a few months short of my 10th anniversary there..."

    Read the article

  • Blocking Users by IP

    SQL Server MVP Brian Kelley brings us a great new article that solves a problem that might help your security. In this short piece, we learn how we can use logon triggers to block users based on their IP address. New! SQL Monitor HostedStart monitoring your SQL Servers in under 5 minutes. Get clear insights into server performance, whilst we manage the monitoring software. Find out more.

    Read the article

  • Digitally Signed Malware on the Rise

    Brought to the forefront in 2010 with Stuxnet, the infamous worm aimed at sabotaging industrial infrastructure, the use of stolen digital certificates is relatively new. Stuxnet's creators digitally signed its rootkit components with stolen certificates from JMicron and RealTek, a pair of semiconductor manufacturers. The worm's existence and complexity caught the security community by surprise. In fact, many researchers predicted that malware creators would begin adopting the same technique to work around driver signature enforcement employed by Microsoft in its 64-bit versions of Windows V...

    Read the article

  • Adobe vs. Apple is going to get uglier

    <b>Sure, It's Secure:</b> "Usually I write about security here, but Apple's iron-bound determination to keep Adobe Flash out of any iWhatever device is about to blow up in Apple's face. Sources close to Adobe tell me that Adobe will be suing Apple within a few weeks."

    Read the article

  • Les spécifications de Java EE 7 approuvées à l'unanimité par le JCP, IBM émet des réserves sur la modularité de la plate-forme

    Les spécifications de Java EE 7 approuvées à l'unanimité par le Java Community Process Mais IBM émet des réserves sur l'extensibilité et la modularité de la plateforme Mise à jour du 17/03/2011 par Idelways Les spécifications de la prochaine version de Java Entreprise Edition viennent d'être approuvées à l'unanimité par le Java Community Process. Douze des treize organisations impliquées dans les Java Specification Request (JSR), dont Google, la fondation Eclipse, Intel et SAP ont voté « oui sans commentaire » à la proposition d'Oracle. Seul IBM a joint des remarques à son vote positif. IBM ...

    Read the article

  • SMTP POP3 & PST. Acronyms from Hades.

    - by mikef
    A busy SysAdmin will occasionally have reason to curse SMTP. It is, certainly, one of the strangest events in the history of IT that such a deeply flawed system, designed originally purely for campus use, should have reached its current dominant position. The explanation was that it was the first open-standard email system, so SMTP/POP3 became the internet standard. We are, in consequence, dogged with a system with security weaknesses so extreme that messages are sent in plain text and you have no real assurance as to who the message came from anyway (SMTP-AUTH hasn't really caught on). Even without the security issues, the use of SMTP in an office environment provides a management nightmare to all commercial users responsible for complying with all regulations that control the conduct of business: such as tracking, retaining, and recording company documents. SMTP mail developed from various Unix-based systems designed for campus use that took the mail analogy so literally that mail messages were actually delivered to the users, using a 'store and forward' mechanism. This meant that, from the start, the end user had to store, manage and delete messages. This is a problem that has passed through all the releases of MS Outlook: It has to be able to manage mail locally in the dreaded PST file. As a stand-alone system, Outlook is flawed by its neglect of any means of automatic backup. Previous Outlook PST files actually blew up without warning when they reached the 2 Gig limit and became corrupted and inaccessible, leading to a thriving industry of 3rd party tools to clear up the mess. Microsoft Exchange is, of course, a server-based system. Emails are less likely to be lost in such a system if it is properly run. However, there is nothing to stop users from using local PSTs as well. There is the additional temptation to load emails into mobile devices, or USB keys for off-line working. The result is that the System Administrator is faced by a complex hybrid system where backups have to be taken from Servers, and PCs scattered around the network, where duplication of emails causes storage issues, and document retention policies become impossible to manage. If one adds to that the complexity of mobile phone email readers and mail synchronization, the problem is daunting. It is hardly surprising that the mood darkens when SysAdmins meet and discuss PST Hell. If you were promoted to the task of tormenting the souls of the damned in Hades, what aspects of the management of Outlook would you find most useful for your task? I'd love to hear from you. Cheers, Michael

    Read the article

  • What is SSL Certificates and How Does It Work

    SSL is an acronym for Secure Sockets Layer. The Secure Sockets Layer is a basically a web security protocol that is developed to establish a secure connection between web server and a browser. SSL is... [Author: Jack Melde - Computers and Internet - May 01, 2010]

    Read the article

  • 'Good-Bye Windows, Hello Linux, Mac' says Google

    <b>Cyber Cynic:</b> "As everyone knows by now who follows technology news, the Financial Times reported that Google "is phasing out the internal use of Microsoft's ubiquitous Windows operating system because of security concerns." Some doubt this story, because they say that's its vague about sources"

    Read the article

  • MySQL 5.6 : la préversion améliore la disponibilité, les performances et l'administration pour les applications Web, Cloud et embarquées

    MySQL 5.6 : la préversion améliore la disponibilité, les performances et l'administration pour les applications Web, Cloud et embarquées Mise à jour du 12/04/2012, par Hinault Romaric Une nouvelle version intermédiaire de développement (DMR) pour MySQL 5.6 vient d'être publiée par Oracle. La haute disponibilité est renforcée dans cette mouture avec de nouvelles fonctions de réplication basées sur des mécanismes d'autoréparation comme les identifiants globaux de transactions (GTID) pour le suivi de l'avancement de la réplication sur une topologie de réplication et de nouveaux utilitaires de réplication MySQL pour f...

    Read the article

  • FreeBSD 8.2 améliore le chiffrement des données et l'intégration du système de fichiers ZFS, FreeBSD 7.4 également disponible

    FreeBSD 8.2 améliore le chiffrement des données Et l'intégration du système de fichiers ZFS, FreeBSD 7.4 également disponible Mise à jour du 28/02/11 Deux nouvelles versions du système d'exploitation UNIX libre FreeBSD viennent de sortir. La première est FreeBSD 8.2. Un e version qui apporte deux nouveautés majeures*: l'amélioration de ZFS et de nouvelles capacités de chiffrement de disques. Pour mémoire, ZFS est un système de fichiers issu de feu OpenSolaris et aujourd'hui sous l'égide de Oracle. A noter, cependant, que ce système particulièrement puissant est ...

    Read the article

  • Is there a secure web-shell for my server?

    - by Stefano Palazzo
    Following the security principle of trust no one, I can't use a service like http://www.serfish.com/. Is there a free software program that I can install on my Ubuntu server to give me secure shell access via a web-interface? I would prefer a small and light-weight solution, so that I can do at least a rudimentary audit of the source code. I would also prefer something that is in the 'main' repository, so that I get the benefit of stable release upgrades.

    Read the article

  • Top Three Factors in New E-Business Setup

    If you are trying to establish a website or e-commerce store, there are three primary factors one must take into consideration. These factors are: acquiring a good domain name and finding affordable hosting, the ability to accept payment, and providing security for your site and your customers.

    Read the article

  • Azure Design Patterms

    - by kaleidoscope
    Design patterns are represented as relationships between classes and objects with defined responsibilities that act in concert to carry out the solution. Azure Design Pattern : Design Pattern on the Azure platform. · Cloud Hosting Patterns · Cloud Data Patterns · Cloud Communication & Sync Patterns · Cloud Security Patterns · Application Patterns More Information: http://azuredesignpatterns.com/   Ram, P

    Read the article

< Previous Page | 761 762 763 764 765 766 767 768 769 770 771 772  | Next Page >