AP’s Twitter account hacked; false ‘Obama injured’ tweet sent
- Apr
- 23
- Posted by Sharon Gaudin
- Posted in Uncategorized
My MySQL Cheat Sheet
- Apr
- 23
- Posted by TKH Specialist
- Posted in MySql, redhat, System Administration
I know, man. No, I mean I know I could use ‘man pages’! Or I could just ‘google it’ but then it isn’t mine. Since I do not have time for a complete brain-dump this MySql “cheat sheet” will grow over time. Feel free to add your favorite MySql commands in the comments, if their […]
read moreAndroid: A Second Career in Security?
- Apr
- 23
Many of us have a wealth of decommissioned corporate-provisioned mobile devices: We’ve bought them, handed them out, and seen them used successfully for years. Now they’re on their way to the great docking station in the sky. However, because these devices are already off the books adapting them for specific security functions can mean achieving certain goals practically for free.![]()
CEO Brian Gentile: ‘Jaspersoft Has Chosen to Disrupt’
- Apr
- 23
- Posted by Jack Germain
- Posted in Enterprise
Business intelligence could be one of the most essential but little-known secrets that drives executive decisions in the marketplace. The BI market is dominated by companies that sell their proprietary business analytics solutions. Few open source companies have countered with software to overtake the traditional vendor establishment. However, open source does have its BI success stories.![]()
One in five data breaches are the result of cyberespionage, Verizon says
- Apr
- 23
- Posted by Computerworld Cybercrime and Hacking News
- Posted in Uncategorized
Recent Comments
- Stefan on Flush This!
- Timestamping your Bash History | Matt's Entropy on Remember when you issued that command…?
- Matt Smith on Remember when you issued that command…?
- Ruan on Putting ‘lsof’ to use
- Dylan F. Marquis on External Mapping of LDAP attributes in CAS
