Monday, November 24, 2014

Why is Microsoft updating Windows PCs for a security bug on the server?

Traces of Regin malware may date back to 2006

BOOK GIVEAWAY: Effective Ruby: 48 Specific Ways to Write Better Ruby

ITworld Today
November 24, 2014

Why is Microsoft updating Windows PCs for a security bug on the server?

The Kerberos vulnerability is only in Windows Server, but Windows PCs are getting extra security fixes. READ MORE

 

Issue highlights

1. Traces of Regin malware may date back to 2006

2. BOOK GIVEAWAY: Effective Ruby: 48 Specific Ways to Write Better Ruby

3. Intel and Micron are going to kill the hard disk drive

4. Getting started with power-line networking

5. Webcam snooper now looking for a job

6. Why it sometimes makes sense to go slow with mobile development

7. Contain yourself: The layman's guide to Docker

8. Molecular flash memory could store massive data

WHITE PAPER: CommVault

5 Steps to Application-Aware Data Protection

Application Owners need to know that they'll be able to recover their data at the application level when disaster strikes, and yesterday's solutions are simply not up to this job. It's time for modern, application-aware data protection - and here's how to get there. Learn more about how to create application-aware protection. Learn More>>

Traces of Regin malware may date back to 2006

Regin was known about for some time by the security industry, according to Symantec. READ MORE

BOOK GIVEAWAY: Effective Ruby: 48 Specific Ways to Write Better Ruby

Learn how to harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. We've got 5 copies to give to some lucky readers. Enter now for your chance to win! READ MORE

Intel and Micron are going to kill the hard disk drive

Intel, Micron breakthrough will yield much greater SSD capacity. READ MORE

Getting started with power-line networking

Power-line networking gives you the range of a wired network without any of the mess or the need to run cable behind the walls. Here's what you need to know to get started. READ MORE

WHITE PAPER: Kaseya

5 Ways to Reduce the Risk of Cybercrime to Your Business

Cybercrime is on the rise. In fact, the risks and costs of cybercrime continue to increase each year. Don't be one of the many organizations naively clinging to the belief that a breach won't happen to them. As an IT professional, you need to take active steps to reduce the risk of cybercrime to your business. Reduce your risk today. Learn more

Webcam snooper now looking for a job

Insecam's creator, possibly based in Moldova, is looking for remote programming work. READ MORE

Why it sometimes makes sense to go slow with mobile development

At Westinghouse, developers work slowly and steadily to avoid bugs in mobile apps used for testing the nuclear power plants that the company builds for electricity providers around the world. READ MORE

Contain yourself: The layman's guide to Docker

As Docker grows in popularity, a question burns: What is it, and why do you need to care about containers? READ MORE

Molecular flash memory could store massive data

Researchers focus on metal-oxide molecule clusters that can retain electrical charge and act as RAM. READ MORE

WHITE PAPER: ForgeRock

How to Forge a Future with Identity Relationship Management

Identity and Access Management (IAM) services were traditionally built for a company's internal use, to assist with manual on and off boarding, and establishing access privileges to company data and systems behind the firewall. View Now>>

NOVEMBER GIVEAWAYS

Now, here's something to be thankful for... We've got 5 copies of each of these books to give to some lucky ITworld readers. Enter now for your chance to win!

Effective Ruby: 48 Specific Ways to Write Better Ruby
If you're an experienced Ruby programmer, Effective Ruby will help you harness Ruby's full power to write more robust, efficient, maintainable, and well-performing code. Enter now!

Responsive Mobile Design: Designing for Every Device
Learn principles, techniques, and best practices for delivering a successful experience to all users on all devices. Enter now!

INSIDER

Get exclusive access to premium articles, product guides, reviews and more.

- 8 tech buzzwords that you need to know

- Free and cheap ways to learn about network administration

- IT resumes: Lies, half-truths and embellishments

SALARY SURVEY

What's your earning power? How does it compare with your peers'?

With help from you and your IT colleagues across the country, our sister site Computerworld will shine a bright light on IT compensation trends. As our way of saying thank you, survey participants can enter a drawing to win one of 3 American Express gift cards for $500! Take the survey now!

Follow ITworld

You are currently subscribed to itworld_today as garn14.tech@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: sean_weglage@itworld.com

To contact ITworld, please send an e-mail to online@itworld.com

Copyright (C) 2014 ITworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to online@itworld.com. **

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.