Category Archives: Red Hat Linux Enterprise
Security, Art of Hacking, & the Worst 2014 Security Breaches
Security is hot; no doubt about it. Consider the fact that between 2011 and 2013, venture investors put nearly $3 billion into cyber security companies, resulting in new funding for some 300 firms (Source: Thomson Reuters). Worldwide security software revenue … Continue reading →
Posted in Business, Hacks, Labs, Linux, Network Architecture, Network Security, Networking, Operating Systems, Programming Languages, Python, Red Hat Linux Enterprise, Security, Technology, Technology, Tips, Tips & Tricks, Windows
|
Tagged backdoor, backdoor access, backdoor script, brute-force, cyber security, data breach, DOS, employee negligence, Experion, firewall, firewall misconfiguration, Gartner, Global Cybersecurity Spending, Goodwill industries, Goodwill Industries data breach, Goodwill industries security breach, hacked Linux, hacked pc, hacked target, hacker, hacking, Home Depot, Home Depot data breach, Home Depot security breach, host scanning, JP Morgan, JP Morgan data breach, JP Morgan security breach, linux, malicious code, malware, malware detection software, malware software, malware software detection, Michael Bruemmer, Michaels Data Breach, Michaels security breach, micro-segmentation, microsegmentation, negligence, Neiman Marcus data breach, Neiman Marcus security breach, network security, novice hackers, packet injection, perl, Point-of-sale, Point-of-sale system, Point-of-sale systems, Point-of-sales system, Point-of-sales systems, Ponemon Institute, POS, POS systems, proxy server, Python, Python client, Python hacking, Python hacks, Python server, RedHat, RedHat Linux, RedHat Linux Enterprise, security, security breach, security exploitation, security infrastructure, security perimeter, security software, sensitive information, social engineering, Sony, Sony data breach, Sony security breach, sophisticated hackers, spyware, spyware detection software, spyware software detection, SQL injection, Target, Target data breach, Target security breach, traffic sniffing, trojan, unpatched Windows, unpatched Windows flaw, vi, Visa, windows, Windows flaw
|
Leave a comment
MariaDB and the Future of MySQL
As you may know by now, since the acquisition of Sun Microsystems by Oracle in 2009 for $7.4 billion, there has been some uncertainty in the industry on the future of MySQL which Sun Microsystems itself acquired for $1 billion … Continue reading →
Posted in Business, Databases, Fedora, Linux, MariaDB, openSUSE, Red Hat Linux Enterprise, Slackware, SUSE Linux Enterprise, Technology, Technology
|
Tagged Andrew Riston, Fedora, forked, forked MySQL, Google, Jaroslav Reznik, MariaDB, MariaDB vs MySQL, Michael "Monty" Widenius, Microsoft SQL Server, Microsystems, Monty, Monty Widenius, MySQL, MySQL documentation, MySQL forked, open source, openSUSE, Oracle, Oracle acquires Sun Microsystems, Oracle Express, Red Hat Linux Enterprise, Slackware, SQL, Sun, Sun Microsystems, Sun Microsystems acquires MySQL, SUSE Linux Enterprise, Widenius, Wikipedia
|
Leave a comment