System News
back1 2 3 4 5 6 7 8 9 10 11 next
Articles for the keywords: UNIX
19 Oct 2014 Top Ten Articles for last few Issues [38820]
Vol 200 Issues 1 and 2; Vol 199 Issues 1, 2, 3 and 4; Vol 198 Issues 3, 4 and 5

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • New Post-Data-Center Model Takes Shape in the Cloud
  • 13 Things Successful People Do In The First 10 Minutes Of The Workday
  • 6 Daily Habits Of The World's Most Successful CEOs
  • Top CIOs All Share These 10 Traits
  • A New Generation Of Solar Cells Could Smash Current Efficiency Limits
  • Fallout from the JPMorgan Chase breach
  • Five urban legends that scare a Linux beginner
  • Nine Best Practices for Cloud Implementation
  • How to fend off data breaches
  • How One Criminal Hacker Group Stole Credentials for 800,000 Bank Accounts

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

19 Oct 2014 Five urban legends that scare a Linux beginner [38828]
SearchDataCenter, October 6th, 2014

"As more Unix systems are replaced with Linux, Unix administrators have to adjust their skills. While the two may look similar, there are some major differences," warns Sander Van Vugt in SearchDataCenter.

"Unlike a typical Unix operating system (OS) for servers, Linux is fundamentally open. In some cases, that developer-friendliness makes Linux appear as a disorganized OS, but this is offset by the additional opportunities that open source affords.

For the Linux beginner, here are five myths you'll hear about the server OS and why they're simply not true..."
(Get More Information . .) open to premium members only

12 Oct 2014 Top Ten Articles for last few Issues [38727]
Vol 200 Issue 1; Vol 199 Issues 1, 2, 3 and 4; Vol 198 Issues 2, 3, 4 and 5

We track how frequently each article is viewed on the web site to determine which the readers consider the most important. For last week, the top 10 articles were:

  • IT Dress Code: 10 Cardinal Sins
  • The FBI's Big, Bad Identification System
  • The Ten Worst People You Meet Working in IT
  • Shellshock Bug: 6 Key Facts
  • IT Skills That Are in Demand, and Those that Will Be
  • 10 Tips to Ensure Your IT Career Longevity
  • What Corporate Security Pros Should do About Shellshock/Bash Bug
  • Bitcoin Could Transform Internet of Things into Vast Data Marketplace
  • What's the Best Data Center Network Topology?
  • Why Deep Packet Inspection still Matters

The longer version of this article has list of top ten articles for the last 8 weeks.
(Get More Information . .) open to premium members only

12 Oct 2014 Six Key Defenses against Shellshock Attacks [38739]
CSO Online, September 29th, 2014

"The number of attempts by hackers to compromise computers through the Shellshock vulnerability is rising, but companies have options for defending against attackers," reports Antone Gonsalves in CSO Online.

"Shellshock is the name given to a set of at least six vulnerabilities in GNU Bash, the default command shell found in Linux, Unix and Mac OS X..."
(Get More Information . .) open to premium members only

12 Oct 2014 Shellshock Bug: 6 Key Facts [38738]
Information Week, September 27th, 2014

"Shellshock, the name given to a pair of vulnerabilities in Bash, a shell program distributed on Linux, Unix, and OS X systems, has been assigned a CVSS score of 10, on a 1-to-10 scale. It's as serious as security bugs get," reports Thomas Claburn in Information Week.

"Worse, the difficulty of exploiting Shellshock is rated "low." Almost anyone with an interest in malicious code will be able to build malware that uses the vulnerabilities. As if to demonstrate that, security companies began detecting Shellshock malware within hours after the vulnerabilities were disclosed.

Here's what you need to know..."
(Get More Information . .) open to premium members only

 
back1 2 3 4 5 6 7 8 9 10 11 next






News and Solutions for Users of Solaris, Java and Oracle's Sun hardware products
30,000+ Members – 30,000+ Articles Published since 1998

!-- end archive_section.tpl -->