When I was involved in a case with the US Secret Service, they brought in an “ethical hacker” as their computer consultant. One of the techniques used against businesses is to target key individuals in the company and send them emails with infected links and attachments.
Java has a critical Java 6 update 29 patch. I have been reading some commentary about issues with 6 update 29. Since Oracle has released Java 7, we now two Java versions being updated. One thing I noticed is that Java 7 doesn’t uninstall Java 6. I read that Java only uninstalls older versions of […]
Microsoft has created a very robust and expandable environment with Exchange 2010. You can add redundancy in a modular fashion. Data Availability Groups (DAG) allow more than one Exchange Mailbox server role to exist with the same data. You can also have more than one of the other roles of Exchange for added redundancy.
Malicious PDF Documents can be a threat to your business I can’t tell you how many people tell me that they never worry about clicking on Adobe PDF file documents because “they are safe”. They are shocked when I tell them that infected PDF files is one of the major ways viruses and trojans are brought […]
Here is Adobe’s official life cycle page listing what their support commitment is to their various products. Notice that Adobe 8 Reader went end of core support on 11/3/2011. Adobe Reader 9 is the oldest fully supported Adobe Reader product. If you are on anything older than Adobe Reader 9, you should upgrade to Adobe’s […]