Enterprise, Workstation, Data Center, Cloud, Networking, Software News And Reviews

In-depth product reviews and news of enterprise, workstation, networking, cloud, SMB, data center and software products and services.

Payback? Perhaps. With the National Security Agency in the wrong kind of spotlight of late, this is probably sweet for many to read. What's being described as "chronic electrical surges" at an NSA data-storage facility have "hundreds of thousands of dollars worth of machinery and delayed the center's opening for a... Read more...
Fueled by the recent NSA leaks brought forth by Edward Snowden regarding PRISM, along with other government eavesdropping programs that have since been brought to light, Pirate Bay co-founder Peter Sunde and a small team have begun work on what I hope becomes a de facto chat client: Hemlis. What sets Hemlis apart... Read more...
Amid increasing threats of cyber attacks by foreign forces, the White House is reportedly going to release an executive order intended to improve the nation's cyber defenses. Details of the directive are expected to be released during a briefing tomorrow morning at the U.S. Department of Commerce. According to The... Read more...
There are some basic rules to follow when selecting a password. For example, while we're sure your significant other is a fine person, using their name as your password is a terrible idea. Same goes for your son's birthday. The object is to select a series of characters and symbols that's nigh impossible to guess, but it doesn't stop there.... Read more...
There was a moment in time where our smartphones and tablets offered all of the wonders of the powerful mobile computing without the cloying downside of security threats we became so accustomed to with our desktops and notebooks. That moment has more or less passed, as individuals and companies alike are getting wise... Read more...
Maybe you're addicted to World of Warcraft and spend every free moment immersed in the most popular massive multiplayer online role-playing game (MMORPG) of all time, wandering through Azeroth doing whatever it is WoW players do. I wouldn't know, but I assume it's a lot of questing and raids. As popular as WoW has become, I've never set virtual... Read more...
Whether true or not, Apple’s Mac OSX is typically perceived as being more secure than Windows. But according to Passware, Inc., a leading maker of password recovery and e-Discovery software for Federal and State agencies, law enforcement, and military organizations, among many other corporate clients, OSX has its fair share of vulnerabilities... Read more...
Not long ago, we learned of an issue that affects all systems running Flash. Although most users' minds automatically think of the vulnerabilities they could be exposed to on their PC, because the BlackBerry PlayBook supports flash, this tablet is also susceptible. For this reason, RIM is releasing a new version of the BlackBerry Tablet OS... Read more...
The JailbreakMe website which allows users to have a browser-based jailbreak for their iOS devices is great for jailbreakers, but works because of a vulnerability in iOS: the iPhone automatically downloads PDF files, and the developer, Comex injected the jailbreak code into the FlateDecode stream section of the file. This is a clear problem... Read more...
Panda's new cloud-based antivirus software, Panda Cloud Antivirus, has reached version 1.0 and has exited beta, the company announced on Tuesday. That said, there are already new bugs filed against 1.0 on the Panda Cloud Antivirus support forum. Panda's Cloud Antivirus doesn't use locally installed virus definition files. Rather, the definitions,... Read more...
With the growing popularity of inexpensive netbooks and nettop PCs, the Linux operating system (often installed on the lowest-priced budget units) is reaching a wider audience--although nowhere close to giving Windows or the Mac OS a run for their money (albeit Mac OS X is based on a Unix kernel). Some pundits even argue that the Linux OS... Read more...
For many, just the thought of setting up and using a network attached storage (NAS) device makes their eyes cross and their pulses increase. While even the technophobic recognize the benefits of having a network-based repository of files for sharing and backup, the concept can still seem daunting to some. The reality is that NAS devices have... Read more...
As it turns out, Swine Flu just might be the least of our worries on a national scale; according to a top official within the US government, cyber espionage and attacks from terror groups are the biggest threats to the country's military computer networks. We've seen time and time again that attacks on our network infrastructure can bring... Read more...
Panda Security released the public beta of its Panda Cloud Antivirus today. The company claims this is the first free cloud-based antivirus thin-client. Panda Cloud Antivirus consists of a lightweight antivirus agent that is connected in real-time to PandaLabs’ Collective Intelligence servers. PandaLabs’ Collective Intelligence servers work... Read more...
Only one day after Google has released its social networking, location-aware application, Google Latitude, a privacy advocacy group is claiming that Google Latitude has "a fundamental design problem that could substantially endanger user privacy." Even though Google Latitude is designed to minimize privacy risks, Privacy International claims... Read more...
Using a combination of social engineering and malicious software, an innovative new way to get people to install malware on their computers has recently popped up, and it all starts with finding a flier on your car's windshield stating that your car is illegally parked. The fliers are fake, but they prey on people's fears by stating, "PARKING... Read more...
A phishing scam, in 140 characters or less? That's what we have here, as a phishing scam apparently hit Twitter on Saturday. According to Twitter, If you receive an email notice saying you’ve received a Direct Message with a link that redirects to what seems like Twitter.com, be careful about entering your Twitter credentials. Instead, look... Read more...
Don't we all love it when clever people take stuff that's right off the shelf, or better still, in hand, and show us how to use it in innovative ways? Simple Help outines a cheap and easy way to set up your own motion detecting security system with detailed, step by step instructions. You don't need much: 1. a PC running Windows... Read more...
When most home and workstation users think of NAS (Network Attached Storage), they think of big, bulky rackmount servers packed to the brim with terabytes of hard drive space (and terabyte-style price tags to match). NAS became a buzzword in the late 90's, during the dot-com explosion, where the product was targeted at companies who were just... Read more...
The PNY Quadro 4 900XGL Professional MCAD Testing Of Nvidia's Flagship Workstation Card By -John Fiegener September 16, 2002   Its been a while since we have gotten our hands on a new Nvidia professional level video card. Last time we here at (tool.) tested the Elsa Gloria II "Quadro", we were quit impressed with the performance... Read more...
Prev 1 2 3