In the recent past, the website of the LA Times was compromised. At the same
time, the blog site of Seagate, a renowned hard disc manufacturer, was also
compromised. A closer scrutiny revealed that Apache web server program was
being used to host both sites. A module was found to be the trigger in both
cases. It allowed the insertion as well as the rotation of malicious iFrames.
These affected all the website pages hosted through the servers.
This particular iFrame is famed for redirecting users to other websites that
host exploit kits. This will particularly target "Blackhole" hence the user's
computer catches the malware.
The existence of this malicious software has been known for quite some time.
In fact, the information security community has even branded it
"Darkleech."The first time such an incidence took place was during the month
of August last year. This d... (more)
In recent times, cloud computing has played a dominant role in the industry.
Whether you feel positively or negatively about it, it is undeniable that
cloud monitoring, like any other component in your network, needs to be
monitored – perhaps more than any other. To more old-fashioned solutions
for monitoring, the cloud creates a number of obstacles: you do not have
ownership of its hardware, it is not run on your network and when problems or
glitches occur you have no control over them.
Today there is a wide range of utilities to help you to manage your cloud
computing, and the ... (more)
On a cutting-edge PC in 1990, the processor, the heart of any computer, would
run at a paltry 33 megahertz.
The first Pentium processor from Intel appeared in 1993, performing
calculations at a then-quick clock speed of 66 MHz. The race to build faster,
more capable processors continued unabated, with milestones such as 1 GHz and
3 GHz reached along the way. Today, the emphasis is on building multiple
processing cores in a single chip, with Intel's second-generation Core i7
offering four cores running at 3.4 GHz.
For memory, that 1990 computer would probably have relied on a mere... (more)
In Australia we are lucky to enjoy freedom of speech, standard levels of pay,
safe streets and safe work environments. Safe workplaces have been on the
agenda for Federal Government for over 2 decades with the development and
enhancement of workplace conditions for all areas of the working community.
Some jobs are more dangerous than others with risks to an employee's health
threatened by hazardous substances. In other environments it may the job
conditions that put them at risk of injury and in the worst cases death such
as with mining or truck driving.
As a business owner you h... (more)
A simple definition of cloud computing is that it's a unique storage service
that involves storage of data and software. With cloud computing, the person
or company who enjoys the service is not fully aware of the location, storage
facilities or configuration of the system used to offer the storage services.
A good analogy to explain this concept is the regular power grid that
supplies power to homes and businesses. The end user who enjoys the services
is hardly aware of all the power generation and distribution devices and
components used to deliver the service.
Since its intro... (more)