Functionality may appeal to bailout-seeking financial services firms Read More
I have talked about this in previous posts, but there are certainly varying opinions about the ethics of monitoring computer activity. I think everyone is in complete agreement that companies... Read More
Costa Rica contract pitch violates US Foreign Corrupt Practices Act Read More
Have you ever used Microsoft's OneNote? I had heard of it, but I never used it until a few months ago. I love it. It is hard to even define... Read More
Email: Defence of Sarah Palin led criminals to hack the site Read More
Oracle's development chief discussed cloud computing strategy Read More
"This is 1,400 times larger than Apple's largest iPod," says Ellison Read More
Multiple vendor DNS protocol implementations could allow a remote attacker to poison the DNS cache. Patches that resolve the vulnerability on the DNS may be rendered ineffective if the DNS is behind a NAT device that does not randomize ports. Public exploit code was made available on July 24, 2008. At the time of this update, neither X-Force nor IBM MSS has witness any active exploitation nor the integration of this exploit into any exploit toolkits. Read More
Microsoft Office is vulnerable to remote code execution through specially-crafted OneNote URLs. Read More
The phone features many Google applications, and is integrated with the Amazon MP3 store Read More
Saturday, September 27, 2008
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment