Slim For iPhone Helps You Keep Up With Facebook, LinkedIn And More, Without Obsessively Checking For Updates

Originally posted on TechCrunch:

In our state of continued information overload, and because of the growing number of services which we have to check in order to keep up with the information that matters to us, things get missed by even the most active social media users. A new startup called Slim wants to change that, and is today launching an iOS application which allows you to discover and be alerted to the most important life events from your friends and colleagues – like births, anniversaries, job changes, and more.

Today, there are already a number of companies attempting to make sense out of the noise that’s out there by leveraging the data on social services, then applying their own unique algorithms to present things you shouldn’t have missed. For example, I have a folder on my iPhone dubbed “Summarize” filled with apps that do similar things to Slim (or at least…

View original 476 more words

Microsoft Reminds Windows XP Users They Only Have 365 Days Left Before It’ll Stop Supporting Them

Originally posted on TechCrunch:

If you are still using Windows XP – or you know somebody who does – Microsoft would like you to remember that you only have 365 more days before the company will end all support for the operating system it launched in New York on October 25, 2001. Both Windows XP SP3 and Office 2003 will go out of support on April 8, 2014, and XP users will stop receiving any new security updates, hotfixes and support (free or paid) from Microsoft. Worldwide, just under 40 percent of all desktops and laptops still use XP today, according to the latest data from Net Applications’ NetMarketShare.

Microsoft already ended mainstream support for Windows XP back in April 2009, but continued to offer extended support for commercial customers and security updates for all customers.

After April 2014, Microsoft writes, using XP is an “at your own risk” situation for “any customers…

View original 276 more words

CT Technologies – IT Simplicity

You can use technology to drive competitive advantage and greater profit for your business, without assuming the burden of managing that technology. Find out how CT Technologies enables our customers to realize the business advantages of more advanced technology solutions by managing the complexity of IT.

Managed Services – Customer Compliance

To take care of your IT environment, CT Technologies uses sophisticated, feature-rich software that handles many security concerns in its architecture. This document describes how it works, and suggests ways that you can establish a solid overall security strategy for your business.

CT Technologies Managed Services Customer Focus

Free up your time and resources for your own business priorities instead of being distracted by IT.

CT Technologies has deep expertise in a broad range of technologies and a core competence in maintaining high availability of IT.

Managed Services Security

CT Technologies, LLC Managed Services Security To take care of your IT environment, CT Technologies uses sophisticated, feature-rich software that handles many security concerns in its architecture. This document describes how it works, and suggests ways that you can establish a solid overall security strategy for your business.

Not only USB modems, I can even attack Mobile phones

Originally posted on Oogle's Blogs:

Russian security researchers have discovered that most of the 3G and 4G USB modems/sticks produced by Chinese hardware manufacturers, provided by mobile operators and telcos to their subscribers are wide open to attacks.

According to the researchers who tested many 3G and 4G modem sticks obtained from various telcos over the past few months, USB sticks produced by chinese hardware manufacturers Huawei and ZTE pose serious security threat.

The security researchers, Nikita Tarakanov and Oleg Kupreev have already managed to show many ways to attack the modems through software vulnerabilities.

This is possible because many chinese-made modems are identical, and therefore its software is very similar. Thus one can make an image of the modem’s file system, alter it and save it back on the modem.

The researchers pointed out that it appeared surprisingly easy to modify the software with the help of free instruments available from Huawei and other…

View original 171 more words

http://www.cttec.net

Free up your time and resources for your own business priorities instead of being distracted by IT.

CT Technologies has deep expertise in a broad range of technologies and a core competence in maintaining high availability of IT.

Virus Bulletin Conference Papers (3)

Originally posted on The Geek Peninsula:

Virus Bulletin 2003 (Thanks, Helen, for digging up a copy for me! I can’t believe I didn’t keep a proofed version.)

David Harley; Fact, Fiction and Managed Anti-Malware Services: Vendors, Resellers and Customers Divided by a Common Language; Virus Bulletin Conference Proceedings, 2003. Copyright is held by Virus Bulletin Ltd, but is made available on this site for personal use free of charge by permission of Virus Bulletin.

This paper was on a topic very dear to my heart, at the time: part of my job was liaising with a company to whom part of our security was outsourced, against my advice. That would be the part of the job description section labelled “in-house scapegoat”.

ABSTRACT
Not all of the assumptions on which the malware management ethos is founded have changed since the 1980s. The anti-virus research community is aware of changes in malware technology, and in malware-management technology…

View original 165 more words

CT Technologies – Interlink Managed Services

Those days are over with Interlinks IT support from CT Technologies. Your systems are constantly maintained, monitored, updated, backed up so your network is RELIABLE! No more waiting, wondering or paying for down time. You get one fixed price for your own IT staff.

http://cttechnologies.net/index.html

Follow

Get every new post delivered to your Inbox.

Join 137 other followers

%d bloggers like this: