When I was involved in a case with the US Secret Service, they brought in an “ethical hacker” as their computer consultant. One of the techniques used against businesses is to target key individuals in the company and send them emails with infected links and attachments.
Symantec has an interesting discussion on the problem of deleting IMG folders and contents. You can read it here.
Java has a critical Java 6 update 29 patch. I have been reading some commentary about issues with 6 update 29. Since Oracle has released Java 7, we now two Java versions being updated. One thing I noticed is that Java 7 doesn’t uninstall Java 6. I read that Java only uninstalls older versions of […]
Here’s the description of Exchange 2010 SP1 RU6: https://tiny.cc/hy1sw
Microsoft has created a very robust and expandable environment with Exchange 2010. You can add redundancy in a modular fashion. Data Availability Groups (DAG) allow more than one Exchange Mailbox server role to exist with the same data. You can also have more than one of the other roles of Exchange for added redundancy.
Malicious PDF Documents can be a threat to your business I can’t tell you how many people tell me that they never worry about clicking on Adobe PDF file documents because “they are safe”. They are shocked when I tell them that infected PDF files is one of the major ways viruses and trojans are brought […]