Archive

Category Archives for "Networking"

12% off Fellowes Powershred Jam-Proof Cross-Cut Paper and Credit Card Shredder – Deal Alert

An ideal consideration for tax time, the Powershred from Fellowes shreds 12 sheets of paper per pass into 397 Security Level P-4 cross-cut particles. It effortlessly shreds staples, credit cards, paper clips, and CDs/DVDs, and is 100% jam-proof. Its waste bin is a generous 6-gallons, and features a simple pull-out design with LED bin-full indicator. The highly rated shredder typically lists for $158, but is currently discounted 12% to $139.99. See the discounted Powershred now on Amazon.To read this article in full or to leave a comment, please click here

LeakedSource’s shutdown is a blow to amateur hackers

Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.U.S. law enforcement has allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.  “All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.To read this article in full or to leave a comment, please click here

LeakedSource’s shutdown is a blow to amateur hackers

Amateur hackers are alarmed with the apparent demise of LeakedSource, a controversial breach notification site that’s been accused of doing more harm than good.U.S. law enforcement has allegedly confiscated its servers, and now some hackers are wondering if customers of LeakedSource might be next.  “All the people who used PayPal, credit card, etc. to buy membership, the FBI now have your email, payment details and lookup history,” wrote one user on HackForums.net.To read this article in full or to leave a comment, please click here

Microsoft’s shell game: 2 new ways to deploy Windows 10

Microsoft is rumored to be working on two new “shells,” but they should not be confused with PowerShell, which is replacing CMD as the primary prompt in Windows 10. While the term “shell” is being used interchangeably, these shells are more like an interface than a command line. First is a single, unified, “adaptive shell” for Windows 10, while the second will actually be a lightweight version of Windows 10. The unified adaptive shell is called “Composable Shell,” or CSHELL. According to a report from Windows Central, which cites unnamed sources, Microsoft's new universal shell will be a single Windows 10 experience that can adapt and scale to the device it’s on, from a phone to a PC. To read this article in full or to leave a comment, please click here

33% off H&R Block Tax Software Deluxe Federal and State 2016 – Deal Alert

Step-by-step interviews guide you through a customized experience relevant to your tax situation. Everything you need to prepare your federal and state taxes in one complete program. Additionally, the H&R Block Refund Bonus program offers you the option of using some or all of your federal individual income tax refund to purchase electronic gift cards from Amazon.com, and as a special bonus they'll add up to 10% to your e-gift card. The PC download is available on Amazon now for 33% off its retail price. Mac version available for the sale price as well. See the popular tax software now on Amazon.To read this article in full or to leave a comment, please click here

Five arrested for hacking into ATMs and stealing $3.2 million

Law enforcement authorities from Europe and Asia have arrested five members of an international cybercriminal group that specialized in hacking into automated teller machine (ATMs).The investigation began in early 2016, according to Europol. Three suspects were arrested in Taiwan, one in Romania, and one in Belarus. Most of them had multiple citizenships and could travel easily between countries, the agency said Friday.Hacking into ATMs to steal money is nothing new, and there are malware programs built specifically for such machines that allow criminals to withdraw money using hidden commands.To infect ATMs with such malware most attackers either receive help from bank insiders or buy service keys that can be used to open the front panels of ATMs and access their communications ports.To read this article in full or to leave a comment, please click here

Five arrested for hacking into ATMs and stealing $3.2 million

Law enforcement authorities from Europe and Asia have arrested five members of an international cybercriminal group that specialized in hacking into automated teller machine (ATMs).The investigation began in early 2016, according to Europol. Three suspects were arrested in Taiwan, one in Romania, and one in Belarus. Most of them had multiple citizenships and could travel easily between countries, the agency said Friday.Hacking into ATMs to steal money is nothing new, and there are malware programs built specifically for such machines that allow criminals to withdraw money using hidden commands.To infect ATMs with such malware most attackers either receive help from bank insiders or buy service keys that can be used to open the front panels of ATMs and access their communications ports.To read this article in full or to leave a comment, please click here

Fragmentation nixed a Cisco-Android network partnership

Cisco Systems tried to give Android devices the same kinds of integration it later provided for iPhones and iPads but gave up because the Android ecosystem was too fragmented.A Cisco-Apple partnership announced in 2015 gives iOS devices capabilities that other wireless clients don’t have on Cisco-based enterprise networks. Among other things, enterprises can designate work-related applications like videoconferencing for priority on the wireless link between iOS devices and a Wi-Fi access point.To read this article in full or to leave a comment, please click here

Fragmentation nixed a Cisco-Android network partnership

Cisco Systems tried to give Android devices the same kinds of integration it later provided for iPhones and iPads but gave up because the Android ecosystem was too fragmented.A Cisco-Apple partnership announced in 2015 gives iOS devices capabilities that other wireless clients don’t have on Cisco-based enterprise networks. Among other things, enterprises can designate work-related applications like videoconferencing for priority on the wireless link between iOS devices and a Wi-Fi access point.To read this article in full or to leave a comment, please click here

Trump, May agree to take on ISIS in cyberspace

The U.K. and U.S. are planning to work more closely to combat the spread of extreme Islamist ideology in cyberspace, British Prime Minister Theresa May said on Friday.May was speaking at a White House news conference, alongside U.S. President Donald Trump, held to outline the results of talks between the two leaders. May is in Washington as the first foreign head of state to meet Trump.She noted the conventional military fight against ISIS is working and the group is losing territory but noted the two countries "need to redouble our efforts.""Today we’re discussing how we can do this by deepening intelligence and security cooperation and critically, by stepping up our efforts to counter Daesh in cyberspace," she said, using an alternate name for the terrorist group.To read this article in full or to leave a comment, please click here

Trump, May agree to take on ISIS in cyberspace

The U.K. and U.S. are planning to work more closely to combat the spread of extreme Islamist ideology in cyberspace, British Prime Minister Theresa May said on Friday.May was speaking at a White House news conference, alongside U.S. President Donald Trump, held to outline the results of talks between the two leaders. May is in Washington as the first foreign head of state to meet Trump.She noted the conventional military fight against ISIS is working and the group is losing territory but noted the two countries "need to redouble our efforts.""Today we’re discussing how we can do this by deepening intelligence and security cooperation and critically, by stepping up our efforts to counter Daesh in cyberspace," she said, using an alternate name for the terrorist group.To read this article in full or to leave a comment, please click here

Starting A Podcast Is Easy. Continuing Is Hard.

Just how hard is it to start a podcast? It isn’t. Starting a podcast, especially for someone with a bit of technical aptitude, is easy. The actual problem is keeping up with the podcast. Podcasting is a major time commitment that busy people struggle to keep.

For many, I think there’s a romantic notion about podcasting. “Hey, I have all these ideas to share, and I’ve got a creative streak. I think I’ll start a podcast. Fans and money will rain from the sky!” The thought of getting your show with some cool intro music, snappy patter with interesting guests, hijinks with your friends, offbeat humor, or maybe deep content hard to find elsewhere is stimulating and exciting. Your own show! How cool will that be?

You will find moments of joy and wonder as a podcaster. But, podcasts produced regularly and worth listening to are a lot of work — a job. If you don’t love it, you’ll find yourself easily distracted. You’ll skip a week. Then another. And the next thing you know, you haven’t put out a show for over a month, and you’re wondering why you should bother picking it back up.

I’ve seen this cycle happen to folks at least ten times over Continue reading

Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition

Researchers at the Intelligence Advanced Research Projects Activity (IARPA) are looking to the public to build a next-generation, automated fingerprint recognition system.The idea behind the competition, called the “Nail to Nail (N2N) Fingerprint Challenge” – which offers $325,000 worth of prizes – is to develop a system that allows for more distinguishing data to be collected from fingerprint biometrics but also eliminates the time and cost associated with using human operators, IARPA said. N2N fingerprints capture the entire fingerprint from the edge of one finger nail bed to the other.To read this article in full or to leave a comment, please click here

Intelligence agency opens $325,000 advanced, automated fingerprint gathering competition

Researchers at the Intelligence Advanced Research Projects Activity (IARPA) are looking to the public to build a next-generation, automated fingerprint recognition system.The idea behind the competition, called the “Nail to Nail (N2N) Fingerprint Challenge” – which offers $325,000 worth of prizes – is to develop a system that allows for more distinguishing data to be collected from fingerprint biometrics but also eliminates the time and cost associated with using human operators, IARPA said. N2N fingerprints capture the entire fingerprint from the edge of one finger nail bed to the other.To read this article in full or to leave a comment, please click here

Avaya: How we arrived at Chapter 11

Avaya John Sullivan, CFA, VP and Corporate Treasurer, Avaya Inc. I have been asked how a company that reports strong financial results can at the same time file for chapter 11 restructuring. How did we, Avaya – one of the top competitors in business communications – arrive at this juncture? After looking at the multiple options of how to deal with our debt, we decided it was a critical next step in our transformation from a hardware company to a software and services company and the best path forward for our customers, partners and employees.To read this article in full or to leave a comment, please click here

Apple collaborates with rivals to advance AI research

Apple has joined rivals as it takes a step ahead to advance research and development of artificial intelligence technologies.After months of collaborating, Apple is joining the Partnership on AI, with other founding members including Google, IBM, Microsoft, Facebook, and Amazon.The Partnership of AI was founded in September last year to also steer debate on best practices on AI. The group believes AI could help in the areas of health care, transportation, and automation in factories.Apple's most visible AI technology is Siri, a voice assistant that can answer questions. But a larger AI strategy is still a subject of speculation. Microsoft, Facebook, IBM, Amazon, and Google have well established AI strategies.To read this article in full or to leave a comment, please click here

Docker 1.13 Experimental features

Docker 1.13 version got released last week. Some of the significant new features include Compose support to deploy Swarm mode services, supporting backward compatibility between Docker client and server versions, Docker system commands to manage Docker host and restructured Docker CLI. In addition to these major features, Docker introduced a bunch of experimental features in … Continue reading Docker 1.13 Experimental features