Saturday, July 24, 2021

Jim Freund

Microsoft’s Telnet Server Vulnerable to DoS Attack

Two Microsoft products, the Telnet service in Windows 2000, and the Telnet daemon (telnetd) in Interix 2.2, have an unchecked buffer in their code, thereby providing a...

Decentralizing the Client

It is belaboring the obvious to say that a desktop computer consists of a CPU and peripherals such as storage, keyboard, video display, mouse, and other add-ons....

Imagine A Product Offering Fast System Restoration

System configuration problems -- caused by hardware or software conflicts, Registry errors, faulty drivers, deleted or corrupted system files -- continue to plague help desks, consistently ranking...

DoS Attacks Go For The Throat

We all yearn for the more innocent time when the acronym DOS stood for your Disk Operating System, or even the Dept. of State for...

Assuring Business Data Continuity

In light of the fact that the recent terrorist attacks have had a great impact upon businesses, particularly financial companies, network managers and IT departments...

Latest Articles

Data Science Market Trends 2021

When famed mathematician John W. Tukey postulated that advanced computing would have a profound effect on data analysis, he probably didn’t imagine the full...

Data Recovery Market Trends 2021

Data recovery is more important than ever in this era of constant cyber attacks and ransomware. The Verizon Data Breach Investigations Report (DBIR) looked...

Trends in Data Visualization

In a world of big data, visualization is becoming a key skill set that every business must master.  Digital technology has transformed the way businesses...

Microsoft Data Portfolio Review

With a host of analytics services for almost any situation, Microsoft Azure’s data services have got just about every base covered.   In the world...