Showing results 1 to 20 of 52

March 23, 2016 By PortableApps

VLC Media Player Portable

VLC Media Player Portable is the popular VLC media player packaged as a portable app, so you can take your audio and video files along...

October 1, 2010 by

Stuxnet: A possible attack scenario

Symantec security researcher Liam O Murchu posits a possible Stuxnet worm attack scenario. His speculation is driven by the technical features of the sophisticated malware threat.

September 21, 2009 by

The best VoIP solution is ...

Businesses looking to implement a new VoIP solution or expand their existing investments are certainly spoiled for choice, and the benefits are not only available to the big spenders.

August 9, 2006 By MovieToolBox

Movie Downloader

Movie Downloader is a tool that helps you to download multiple media files (movie, music, pictures) from your favorite Web sites. Some...

August 9, 2009 by

Geek Sheet: Virtualizing Free Linux Distributions in Windows Server 2008 R2

It's been a while since we've had a hardcore Geek Sheet installment, and I promise that this one will be a real winner.Some of you may be aware that the updated Hyper-V bare-metal hypervisor virtualization layer in Microsoft's upcoming Windows Server 2008 R2 (Which is due to be released August 14th to MSDN and Technet customers) now has support for SUSE Linux Enterprise Server 11 (SLES) and Red Hat Enterprise Linux 5.

June 8, 2015 By Convivea

Bit Che

Bit Che is a framework and script language for searching Bit Torrent websites and search engines for torrents. Bit Che uses user submitted...

October 7, 2008 by

C'mon, Vista really isn't that bad

Picture the scene. A small country pub in Canterbury, a warm, autumn evening, surrounded by friends drinking and smoking in the beer garden; relaxing after a difficult, hard day at work.

March 10, 2008 by

NComputing L230

NComputing's L230 thin client is an option if you need to add a group of low-impact users to an existing Ethernet LAN. However, you'll need to ensure that the host PC is adequately specified to deliver acceptable performance to the terminals attached to it.

February 27, 2008 by

Microsoft's free enterprise search is a must try

At the Heroes Happens {here} event in LA yesterday which saw the launch* of Windows Server 2008, one of the relatively hidden gems of the event in my opinion was Microsoft's free** Search Server 2008 Express.  It's is a streamline install of Office SharePoint Server 2007 with almost all the enterprise search features that most users would want and is a must download for any Windows Server shop.

June 14, 2007 by

Day 3 with a new Dell and Vista

I’m documenting my experience with a new Dell C521 running Windows Vista. After an initial glitch that requires an onsite service call from Dell, I'm back in business. Today's goal is to stress-test the machine using a selection of real-world applications and see how it performs under fire. How much can a $500 PC handle before it falters? The answer even surprised me.

February 20, 2007 by

Living with Windows Vista: Week one report card

It's been one week that I've not used Windows XP on my main computer and actually living with Windows Vista so here is my progress report.  As some of my readers know, I've was having stability problems with my main computer as well as a number of other annoying bugs in Vista that kept me from jumping to Windows Vista.

January 26, 2007 by

Before you go Vista: Advice from nine experts

I asked some of the best known of the Windows experts out there for one -- just one -- piece of advice they'd give to users who have decided to take the Windows Vista plunge. Here's what they said -- and showed, via some interesting screen-shot captures.

November 11, 2006 by

Critical Broadcom Windows driver exploit released!

According to Johnny Cache, this particular exploit is extremely reliable and results in "100% ownage" which means your computer belongs to the hacker if it's attacked using this exploit. Since the exploit has been rolled in to the Metasploit 3.0 framework which includes kernel-level shell code, the exploit can be performed with a moderate amount of hacking knowledge. This flaw is extremely dangerous because it exploits the kernel of the operating system which means it bypasses all conventional security measures like anti-virus, HIDS, firewalls, and user privileges. The attack range is limited to Wi-Fi range which is typically 100 to 200 feet but can be extended with high-powered antennas.

June 30, 2006 by

Rupert Goodwins' Diary

Tuesday 27/06/2006 In the same way that the brightness and colour of a star shows how old it is, the speed and percentage of locked-down wireless access points can show how advanced a particular area is in adopting new technology. Take Indiana, where a study in correlating the percentage of secure domestic access points to other factors showed no link whatsoever.

June 30, 2006 by

Rupert Goodwins' Diary

SCO slides towards defeat, evil clowns enforce Wi-Fi security, the Hoff explains broadband and the attack of the ring-necked parakeets — another week on the periphery of the IT machine


You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.
See All
See All

Most Popular