Skip to content

TechRepublic

Trending Now

Close-up Shot of Female IT Engineer Working in Monitoring Room. She Works with Multiple Displays.
Image: Gorodenkoff/Adobe Stock
Article

Why IT support is needed for no-code and low-code applications

Woman using Microsoft Outlook application, close-up
Image: FellowNeko/Adobe Stock
Article

How to import a Google calendar into Microsoft Outlook

report organizations ransomware
Image: normalfx/Adobe Stock
Article

Black Basta may be an all-star ransomware gang made up of former Conti and REvil members

best cybersecurity certifications 2022
Image: Ico Maker/Adobe Stock
Article

Best cybersecurity certifications in 2022

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of siliconsamurai-gmail

siliconsamurai-gmail

Send siliconsamurai-gmail an email

Latest from siliconsamurai-gmail

  • The pragmatic professional
    CXO

    The pragmatic professional

    I’m concerned that, even among IT professionals (that is, people paid to manage other people’s computers), there is often a very narrow view of what is “correct.” Some people not only insist that their particular choice of IT tools is the best, they demand that others acknowledge this. That attitude seems more appropriate for the ...

    siliconsamurai-gmail
    Published:  June 3, 2007, 9:27 PM PDT Modified:  June 3, 2007, 9:27 PM PDT Read More See more CXO
  • Two Apples a day won’t keep hackers at bay, but neither will Firefox
    Enterprise Software

    Two Apples a day won’t keep hackers at bay, but neither will Firefox

    Quick, what’s Apple’s biggest vulnerability? Right, QuickTime! QuickTime just happens to run on both Windows and Mac OS X, which makes this the second cross-platform threat I have reported here in the past week. This is also the second time in a week Apple has released a security patch to block malicious Web sites from ...

    siliconsamurai-gmail
    Published:  May 30, 2007, 12:09 AM PDT Modified:  May 30, 2007, 12:09 AM PDT Read More See more Enterprise Software
  • Cross-platform open source threat: Is open source really more secure?
    Open source

    Cross-platform open source threat: Is open source really more secure?

    Sophos has disclosed the existence of a proof-of-concept worm (StarOfficeBadbunny) that attacks through a vulnerability in OpenOffice and other programs using StarBasic macros. According to Sophos, this is a multi-platform threat affecting Windows, Mac OS, and Linux. It is written in several scripting languages, including Perl. While this particular threat is minor, it does illustrate ...

    siliconsamurai-gmail
    Published:  May 24, 2007, 10:57 PM PDT Modified:  May 24, 2007, 10:57 PM PDT Read More See more Open source
  • Critical new Opera 9.x vulnerability and Norton 2004 threats
    Security

    Critical new Opera 9.x vulnerability and Norton 2004 threats

    This is a remote system access vulnerability caused by an ActiveX flaw. This is fixed by upgrading Windows Opera versions to Opera 9.21: http://www.opera.com/download/ Secunia is reporting a highly critical ActiveX remote system access threat in Norton Internet Security 2004, Norton IS 2004 Professional, and Norton Personal Firewall 2004. I hope none of you are ...

    siliconsamurai-gmail
    Published:  May 21, 2007, 5:10 AM PDT Modified:  May 21, 2007, 5:10 AM PDT Read More See more Security
  • Microsoft announces security bulletin changes
    Security

    Microsoft announces security bulletin changes

    A Microsoft spokesperson just notified me of planned changes to both the advanced notification service (ANS) and format of the monthly scheduled Microsoft security bulletins. These changes are worthy of note, but they will not affect the actual information provided — just the way it is presented. According to the spokesperson, the changes are intended ...

    siliconsamurai-gmail
    Published:  May 16, 2007, 3:38 AM PDT Modified:  May 16, 2007, 3:38 AM PDT Read More See more Security
  • Get up to speed on Microsoft’s seven critical security bulletins
    Software

    Get up to speed on Microsoft’s seven critical security bulletins

    For May's Patch Tuesday, Microsoft released seven security bulletins -- and they're all critical updates. John McCormick tells you what you need to know about all seven security bulletins.

    siliconsamurai-gmail
    Published:  May 14, 2007, 2:42 PM PDT Modified:  June 8, 2007, 10:11 AM PDT Read More See more Software
  • iPods endanger pacemaker patients
    After Hours

    iPods endanger pacemaker patients

    We’ve all been in hospitals and seen the signs warning us not to use cell phones because of possible dangers to patients on delicate electronic equipment, but a Michigan high school student has found that iPods interfered with about one-third of implanted pacemakers tested. The Denver Post (among multiple other publications) is reporting that a ...

    siliconsamurai-gmail
    Published:  May 11, 2007, 12:06 AM PDT Modified:  May 11, 2007, 12:06 AM PDT Read More See more After Hours
  • Photoshop file threat emerges
    Security

    Photoshop file threat emerges

    Just when you thought it was safe to do something online, an example emerges that shows there can be dangerous vulnerabilities in virtually any application. I’m discussing this Photoshop file threat not because I think it will become some massive security threat to a lot of users but simply as an example that ANYTHING connected ...

    siliconsamurai-gmail
    Published:  May 6, 2007, 10:34 PM PDT Modified:  May 6, 2007, 10:34 PM PDT Read More See more Security
  • Top 10 security mistakes to avoid
    Security

    Top 10 security mistakes to avoid

    Security management has a lot to do with details — staying on top of the latest threats and patching flaws. But sometimes, it has more to do with the big picture and how you approach security management. Here are the top 10 security mistakes I’ve seen people make: 1. Trusting people: The biggest threat to ...

    siliconsamurai-gmail
    Published:  April 29, 2007, 10:58 PM PDT Modified:  April 29, 2007, 10:58 PM PDT Read More See more Security
  • Apple patches 25 Mac OS X vulnerabilities
    Security

    Apple patches 25 Mac OS X vulnerabilities

    There are multiple critical remote code execution and DoS vulnerabilities in Macintosh OS X versions 10.3.9, Server 10.3.9, 10.4.9, and Server 10.4.9. The 25 vulnerabilities are a mix of locally and remotely exploitable threats. Here are links to the updates:  10.3.9 Client  10.3.9 Server  Security Update 2007-004 Universal  Security Update 2007-004 PCC SuSE security updates SuSE ...

    siliconsamurai-gmail
    Published:  April 22, 2007, 10:40 PM PDT Modified:  April 22, 2007, 10:40 PM PDT Read More See more Security
  • 1
  • 2
  • 3
  • 4
  • 5
  • 10
  • 20
  • 30
  • Next
458 results

TechRepublic Premium

  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire an Operations Research Analyst

    Recruiting an Operations Research Analyst with the right combination of technical expertise and experience will require a comprehensive screening process. This Hiring Kit provides an adjustable framework your business can use to find, recruit and ultimately hire the right person for the job.This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Quick glossary: Industrial Internet of Things

    The digital transformation required by implementing the industrial Internet of Things (IIoT) is a radical change from business as usual. This quick glossary of 30 terms and concepts relating to IIoT will help you get a handle on what IIoT is and what it can do for your business.. From the glossary’s introduction: While the ...

    Downloads
    Published:  May 19, 2022, 5:00 PM PDT Modified:  May 21, 2022, 12:00 PM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Software Procurement Policy

    Procuring software packages for an organization is a complicated process that involves more than just technological knowledge. There are financial and support aspects to consider, proof of concepts to evaluate and vendor negotiations to handle. Navigating through the details of an RFP alone can be challenging, so use TechRepublic Premium’s Software Procurement Policy to establish ...

    Published:  April 14, 2022, 5:00 PM PDT Modified:  April 16, 2022, 1:00 PM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice