Critical Java vulnerability
Post

Critical Java vulnerability

We would like to inform you that there is a critical new Java vulnerability and millions of devices around the world are at risk , Mozilla advises disabling Java in browsers Firefox to mitigate risk, while providing patching from Oracle Solution: Please stop all add-ons associated with Java in browsers that you use to avoid...

On January 15, 2013February 19, 2018by
Post

Come to Fixed Solutions booth at CairoICT 2011

Come to our booth in Hall 4 CairoICT 2011 , Fixed Solutions will show Arabhosters ,Ubuntu , Metasploit Pro , Nexpose Vulnerability Scanner , Acunetix Web Vulnerability Scanner , Astaro Security Gateway and NetClarity NAC ( Network Access Control )       Founded in 2006 , Arabhosters became rapidly one of the important hosting...

On May 20, 2011May 20, 2011by
Post

8 Layers of Security Every Computer Should Have

So what do we need on our computers to protect our data? Thompson says the best way to set up computer security is through layering. Even if one area of protection is only 75 percent effective, the increasing layers will close all the holes. Those layers should include the following: Firewalls. Firewalls protect the computer...

On June 8, 2010June 8, 2010by
Post

How We Sped Up Our Website

Posted by Ken Hardin 10 Tips For Speeding Up Your  Site .1 Move Your DNS  To The Cloud Troy said this may well have been the single biggest step we took to improve our site performance metrics. By moving to a DNS provider with servers across the globe, our users no longer need to make...

On June 8, 2010June 8, 2010by
Post

Hardware, Linux Support Becoming More Transparent

Posted by Ken Hardin HP’s announcement that it plans to support the Debian Linux distro for some of its server products reflects what may be a growing trend of hardware vendors bypassing Linux OS partners and just handling support themselves. Unlike Red Hat, which makes its money from support and maintenance, and SuSE, with its...

On June 8, 2010June 8, 2010by
Post

Ubuntu Shifts Strategy to Servers

Posted by Lora Bentley Because 70 percent of Canonical’s services revenue comes from the server side of its Ubuntu business, the company behind the popular Linux distro plans to beef up its server software, Computerworld reports. Ubuntu is well-liked enough among its desktop users — my boss being one of the newest — that Dell...

On June 8, 2010June 8, 2010by
Post

Cisco Unveils Switches, VPN Firewall for Entry-Level SMB Networking

Posted by Paul Mah Network giant Cisco has its eyes cast on SMB networking, with the unveiling of the Cisco 100 series unmanaged switch designed for small and mid-sized businesses.  The Cisco 100 series replaces the previous SD and SR switches, and comes with a number of enhancements where power management is concerned. Speaking to...

On June 8, 2010June 8, 2010by
Post

Sample Social Networking Policy

The following is the company’s social media and social networking policy. The absence of, or lack of explicit reference to a specific site does not limit the extent of the application of this policy. Where no policy or guideline exist, employees should use their professional judgment and take the most prudent action possible. Consult with...

On June 8, 2010June 8, 2010by
Post

Protect Yourself From Spyware

How can you protect yourself from these insidious little programs? Ironically, many users unwittinglyagree to install these programs. In fact, removing some spyware and adware might render some freeware or shareware programs useless. Below are 5 easy steps you can follow to try to avoid and, if not avoid, at least detect and remove these...

On June 8, 2010June 8, 2010by
Post

Disaster Recovery Plan Testing

From a management perspective, the primary objective of Disaster Recovery Plan (DRP) testing is to evaluate whether or not the DRP is capable of restoring one or more business-critical processes to functionality within a specified period of time. At the end of the day a series of successful tests provides a high level of assurance...

On June 8, 2010June 8, 2010by