Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium

Account Information

Join or sign in

Register for your free TechRepublic membership or if you are already a member, sign in using your preferred method below.

Use Facebook
Use Linkedin

Join or sign in

We recently updated our Terms and Conditions for TechRepublic Premium. By clicking continue, you agree to these updated terms.

Welcome back!

Invalid email/username and password combination supplied.

Reset password

An email has been sent to you with instructions on how to reset your password.

Welcome to TechRepublic!

All fields are required. Username must be unique. Password must be a minimum of 6 characters and have any 3 of the 4 items: a number (0 through 9), a special character (such as !, $, #, %), an uppercase character (A through Z) or a lowercase (a through z) character (no spaces).

Loading
Image of siliconsamurai-gmail

siliconsamurai-gmail

Send siliconsamurai-gmail an email

Latest from siliconsamurai-gmail

  • DST – Have you considered a possible April Fool’s Joker?
    Tech & Work

    DST – Have you considered a possible April Fool’s Joker?

    One problem people need to be aware of is the possibility that they will update the time correctly on the new schedule but that may not be the end of your troubles. What if you then do a backup restore and the date change gets reset without you realizing it? Or, what if you update ...

    siliconsamurai-gmail
    Published:  March 5, 2007, 10:37 PM PST Modified:  March 5, 2007, 10:37 PM PST Read More See more Tech & Work
  • Y2K’s Revenge? Not quite, but DST change will cause trouble!
    Software

    Y2K’s Revenge? Not quite, but DST change will cause trouble!

    I lived through all the Y2K excitement and did very well out of Y2K financially as many of you probably did (especially COBOL programmers), so I know the sort of panic that can grip IT over something as simple as a date. But precise time coordination is vital for a lot of computer operations and ...

    siliconsamurai-gmail
    Published:  March 4, 2007, 8:42 PM PST Modified:  March 4, 2007, 8:42 PM PST Read More See more Software
  • Free Security Support Is Partially Responsible for Bad Software!
    Storage

    Free Security Support Is Partially Responsible for Bad Software!

    Another blogger here at TechRepublic.com recently asked if it was reasonable to keep providing free support just because we know how.  VERY interesting question! You’ve done it. I’ve done it. (Heck, I’ve done it in the last week, TWICE!) (OK, once for a CPA, once for an M.D.. If the Mayor calls I’ll help him ...

    siliconsamurai-gmail
    Published:  March 4, 2007, 12:45 AM PST Modified:  March 4, 2007, 12:45 AM PST Read More See more Storage
  • The value of spam
    Banking

    The value of spam

    Spam, unwanted commercial e-mail, costs businesses billions each year in lost productivity and actual IT time spent defending against it. Spam is also a wonderful source of malware infections and, if you care about having happy, satisfied employees, it is a personal disaster for those who fall prey to things such as 3-Card Monte games, ...

    siliconsamurai-gmail
    Published:  March 3, 2007, 9:00 PM PST Modified:  March 3, 2007, 9:00 PM PST Read More See more Banking
  • AusCERT NSS SSL 3.11.4 Library threat warning (Includes Sun ONE and Java System Web Server)
    Security

    AusCERT NSS SSL 3.11.4 Library threat warning (Includes Sun ONE and Java System Web Server)

    Those nice people down under who are suffering a prolonged draught (probably due to global warming) are at the forefront of English language Internet and software vulnerability warnings. They recently released a warning that both server and client software that uses NSS SSL libraries 3.11.4 and earlier are vulnerable to remote compromise. That definitely applies ...

    siliconsamurai-gmail
    Published:  February 26, 2007, 10:08 PM PST Modified:  February 26, 2007, 10:08 PM PST Read More See more Security
  • Highly critical Office 2007 vulnerability
    Software

    Highly critical Office 2007 vulnerability

    ZDNet UK (http://news.zdnet.co.uk/security/0,1000000189,39286055,00.htm) has published a warning of a new and very dangerous security flaw in the new consumer version of Office 2007. This is a file format problem discovered by eEye Security. The threat was disclosed to Microsoft by eEye on February 16. http://research.eeye.com/html/advisories/upcoming/20070216.html There are no details in the eEye Research posting except ...

    siliconsamurai-gmail
    Published:  February 26, 2007, 9:51 PM PST Modified:  February 26, 2007, 9:51 PM PST Read More See more Software
  • Multiple critical vulnerabilities in Firefox
    Enterprise Software

    Multiple critical vulnerabilities in Firefox

    There are various vulnerabilities in Firefox 1.x and 2.0.x which can lead to cross site scripting, remote system access, and various other attacks. You can see details at the Mitre CVE site. CVE-2006-6077CVE-2007-0008CVE-2007-0775 CVE-2007-0776 CVE-2007-0777 CVE-2007-0778 CVE-2007-0779 CVE-2007-0780 CVE-2007-0800 CVE-2007-0981 CVE-2007-0995 A reminder, you can find the original CVEs by inserting the correct number in: ...

    siliconsamurai-gmail
    Published:  February 26, 2007, 9:42 PM PST Modified:  February 26, 2007, 9:42 PM PST Read More See more Enterprise Software
  • Get up to speed on Microsoft’s February security bulletins
    Microsoft

    Get up to speed on Microsoft’s February security bulletins

    February was a busy month for Microsoft. The software giant released a dozen security bulletins, half of which it rated critical. Last time, John McCormick reviewed Microsoft's six critical security bulletins for February. This time, he'll bring you to speed on the remaining six bulletins, which address important threats.

    siliconsamurai-gmail
    Published:  February 26, 2007, 2:08 PM PST Modified:  June 8, 2007, 10:10 AM PDT Read More See more Microsoft
  • Microsoft releases six critical security bulletins for February
    Enterprise Software

    Microsoft releases six critical security bulletins for February

    For February's Patch Tuesday, Microsoft released a dozen security bulletins, rating six of them as critical. John McCormick tells you what you need to know about the six critical updates.

    siliconsamurai-gmail
    Published:  February 16, 2007, 1:10 PM PST Modified:  June 8, 2007, 10:09 AM PDT Read More See more Enterprise Software
  • Attempted attack on Net backbone highlights potential risks
    Developer

    Attempted attack on Net backbone highlights potential risks

    When hackers recently targeted the backbone of the Internet, they caused little damage. But the attempt underscores the risks associated with our reliance on the Web. John McCormick weighs in on the attempted attack and brings you up to speed on other recent threats.

    siliconsamurai-gmail
    Published:  February 12, 2007, 1:54 PM PST Modified:  June 8, 2007, 10:09 AM PDT Read More See more Developer
  • Prev
  • 2
  • 3
  • 4
  • 5
  • 6
  • 10
  • 20
  • 30
  • Next
458 results

TechRepublic Premium

  • TechRepublic Premium

    How to recruit and hire a Scrum Master

    Recruiting a Scrum Master with the right combination of technical expertise and experience will require a comprehensive screening process. This hiring kit provides a customizable framework your business can use to find, recruit and ultimately hire the right person for the job. This hiring kit from TechRepublic Premium includes a job description, sample interview questions ...

    Downloads
    Published:  August 5, 2022, 5:00 PM PDT Modified:  August 7, 2022, 4:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Web 3.0 quick glossary

    Knowing the terminology associated with Web 3.0 is going to be vital to every IT administrator, developer, network engineer, manager and decision maker in business. This quick glossary will introduce and explain concepts and terms vital to understanding Web 3.0 and the technology that drives and supports it.

    Downloads
    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 1:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    How to recruit and hire a User Experience Designer

    While the perfect color palette or the most sublime button shading or myriad of other design features play an important role in any product’s success, user interface design is not enough. Customer engagement and retention requires a strategic plan that attempts to measure, quantify and ultimately create a complete satisfying user experience on both an ...

    Published:  August 4, 2022, 5:00 PM PDT Modified:  August 7, 2022, 3:00 AM PDT Read More See more TechRepublic Premium
  • TechRepublic Premium

    Industrial Internet of Things: Software comparison tool

    IIoT software assists manufacturers and other industrial operations with configuring, managing and monitoring connected devices. A good IoT solution requires capabilities ranging from designing and delivering connected products to collecting and analyzing system data once in the field. Each IIoT use case has its own diverse set of requirements, but there are key capabilities and ...

    Downloads
    Published:  May 26, 2022, 5:00 PM PDT Modified:  May 28, 2022, 8:00 AM PDT Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2022 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice