public marks

PUBLIC MARKS from alamat with tag blog

26 April 2006

Oracle Unveils Oracle Database Vault

Oracle today introduced Oracle Database Vault, an advanced security product to protect and limit access to sensitive data and applications. Oracle Database Vault enforces preventive controls to help meet compliance requirements by restricting powerful users, such as database administrators (DBAs), from unauthorized access to specific information.

Things to Look for when Buying a New Computer

This article will address both desktops and notebooks but the examples that are dealt in the article are mainly desktops. I am just going to scan the software surface and when I say software, I mean windows and not any other OS.

25 April 2006

My sysadmin toolbox

Torsmo differs from other system monitors, such as GKrellM, in that it does not spawn a new window, but instead renders text directly to your desktop. It can display almost anything about your system, including uptime, current CPU usage, network activity, hard drive usage, memory usage, and swap usage. The program's developers wrote it to use as little of your system's resources as possible, and it does a good job of this.

Linux Performance Tuning

Why tune my system? This is probably the first thing you want to know. When a distribution is packaged and delivered to clients, it is designed to be fully compatible with most of the computers available in the market.

Arcane Denial: Try the new Yahoo!Mail beta

While everyone else is waiting to try the new Yahoo! Mail Beta, people in the UK, Germany and France are already using it.

Fixing Wi-Fi Security Problems: Hire Wardrivers

On April 20, Westchester County in New York approved a law that will slap local business owners with a warning or a fine for not securing their Wi-Fi networks. The legislation takes effect in 180 days.

Beware wireless hacking

SECURITY experts are warning internet users of a new threat to their computer systems, with thieves gaining access to other people's broadband from unsecured wireless networks in homes and businesses.

SSL/TSL and SSH Not So Secure Anymore

Polish scientists from Wroclaw University of Technology have found a vulnerability in security technologies used across the Internet that may allow kleptographic attacks resulting in silent theft of information without user's awareness.

Hackers News: Rootkits to mask most malware by 2008

Rootkits that hide malicious software from anti-virus and anti-spyware tools are growing in number and sophistication, and will pose an unprecedented risk to users by 2008, security company McAfee said this week.

Doubts, fears and the Australian ID card

Concerns about the privacy of individuals are as important as ever and ought not be compromised. Whenever the Federal Government discusses its plans for a "smartcard" - which would allow citizens to electronically access Medicare and other government services - speculation inevitably strays to the possibility that a compulsory national ID card will also be introduced.

23 April 2006

Security Myths and Passwords

In the practice of security we have accumulated a number of “rules of thumb” that many people accept without careful consideration.

Bush shows support for tech industry

The United States is losing its competitive edge in science and technology, and President Bush told Silicon Valley leaders Friday that the country can’t afford to let that happen.

10 Interesting Facts About Windows

These are some of the things that not many people would know about Windows. It is not a household knowledge. But, having knowledge of these would let you appreciate Windows in a whole new way. The development of Windows started a whole new era in the computing industry.

alamat's TAGS related to tag blog

3d +   action +   addict +   aliens +   anito +   apache +   apple +   cinema +   comedy +   comics +   computer +   cult +   database +   distro +   download +   dralnux +   email +   entertainment +   explorer +   files +   firewall +   freeagent +   freebsd +   from +   fun +   gadget +   game +   games +   google +   guides +   hacking +   hacks +   hardware +   Hatton +   help +   image +   improve +   inspirational +   ip +   ipod +   itunes +   linux +   mac +   maker +   malware +   marvel +   microsoft +   mobile +   monster +   movie +   movies +   mysql +   myths +   N97 +   network +   networking +   news +   nokia +   pacquiao +   passwords +   photo +   picture +   pinoy +   pro +   religion +   replication +   review +   reviews +   roach +   rootkit +   scenery +   seagate +   security +   shell +   shop +   signs +   software +   spam +   spammers +   spyware +   stories +   system +   tech +   techy +   theater +   tips +   traffic +   tricks +   trojan +   tutorial +   tv +   tweET +   tweeter +   unix +   update +   want +   watch +   windows +   wireless +   wordpress +