What security implications are there in using Open Database Connectivity in a client/server environment? Can we use it over a wireless LAN? ODBC does not encrypt your data for transmission, so to ...
The biggest threat to your network isn't always the latest malware outbreak or a clever hacker; sometimes it's actually the users themselves! An unknowing user is an accident waiting to happen. This ...
At the start of the millennium, the Wired Equivalent Privacy (WEP) security protocol allowed encrypted data to be sent securely between two endpoints. In 2003, the ...
Old computer systems were very easy to understand. You would simply enter data into your workstation and it would be fed to the mainframe computer. Called a master/slave system, the mainframe master ...
Whenever you use an ATM to check your balance or withdraw some money, you are actually participating in a client-server interaction with a computer on your bank's network. A client-server network ...
With so much progress made virtualizing servers, many observers say it’s time to turn our attention to the desktop. But is it better to use client-side or server-side hypervisors? Hypervisors have, at ...
Many companies are using open source Linux servers for DNS/DHCP servers and Web servers, but it is also possible to use Linux or UNIX as a file server. The Network File System has been around for many ...
Appendix A: Server Security Compliance Checklist (Login required: IT Staff only) Appendix B: Security and Configuration Management Tools (Login required: IT Staff only) All university owned devices, ...
If you’re familiar with the film The NeverEnding Story, then you know that the goal of the hero, Atreyu, was to reach the boundaries of Fantasia. He’s disappointed to learn that Fantasia has no ...