This is quite scary. Malware installed on your smartphone could record keystrokes on nearby keyboards: Read the article here: https://tiny.cc/6hpdu
Smartphone malware could indentify words typed on nearby keyboards
New virus threatens Iran’s nuclear program
Rumors were the Israeli’s created the first virus that sought out and decimated the Iranian nuclear plant. Is this their second computer attack? You can read about it here: https://tiny.cc/azpjk
Description of Update Rollup 6 for Exchange Server 2010 Service Pack 1
Here’s the description of Exchange 2010 SP1 RU6: https://tiny.cc/hy1sw
Small business owners. Do you have an IT plan?
In speaking with small business owners on a daily basis I have found that many of them have not put together either a short or long term plan for their company’s technology needs. Most times you’ll hear, “we’ll get it fixed later as long as it’s working”, or “maybe next year”. While there are always certain items that can […]
Comparing ESXi 4.1 and ESXi 5.0 Scaling Performance
VMware has released some exciting performance data showing the improvements of ESXi 5.0 over ESXi 4.1 on the same hardware. You can read about their findings here: https://tiny.cc/599fx
Is Google Plus A Social Media Failure?
The trade press is awash in negative Google articles. Here is one of them. I think the author’s comments about “jeopardizing Google itself” are a bit over the top, but Google has hit a very rough patch on many fronts. I find Google + quite different and interesting than Facebook.
What Is VMware Thin App Factory?
VMware Thin App Factory sounds like a major step forward for VMware in the area of application virtualization. It is a new tool set that dramatically simplifies application virtualization. Think of it as a P2V for applications. Here is a nice summary article about this exciting new product: https://tiny.
Exchange Server 2010 High Availability and Transaction Logs Explained
Microsoft has created a very robust and expandable environment with Exchange 2010. You can add redundancy in a modular fashion. Data Availability Groups (DAG) allow more than one Exchange Mailbox server role to exist with the same data. You can also have more than one of the other roles of Exchange for added redundancy.
A Word About Adobe PDF Document Security and Two Simple Steps You Can Take To Protect Yourself
Malicious PDF Documents can be a threat to your business I can’t tell you how many people tell me that they never worry about clicking on Adobe PDF file documents because “they are safe”. They are shocked when I tell them that infected PDF files is one of the major ways viruses and trojans are brought […]
Cybercommand chief opposes U.N. net control
The commander of the U.S. Cyber Command said Thursday that he does not favor giving the United Nations the power to regulate the Internet. You can read about it here.