Search for: "sysadmin" Results 21 - 40 of 45
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
24 Dec 2014, 2:44 pm by Bill Budington
More sysadmins are aware of PFS and HSTS, and have been kept working late applying fixes on the seemingly unending array of vulnerabilities discovered in implementations, Heartbleed and POODLE being only the most high-profile cases, with smaller ones affecting Apple SSL and GnuTLS. [read post]
27 May 2015, 9:16 am
If you're a sysadmin you can follow this guide to upgrade to eliminate old ciphersuites. [read post]
24 Mar 2009, 7:16 am by Shaunna
Entrepreneurs, innovators, sysadmins, programmers, designers, games developers, hardware experts, tech journalists, tech consultants. [read post]
24 Mar 2009, 11:16 am
Entrepreneurs, innovators, sysadmins, programmers, designers, games developers, hardware experts, tech journalists, tech consultants. [read post]
19 Dec 2013, 2:30 pm by Sean Gallagher
"He didn't need to be a sysadmin to get to [the data]," NSA Director of Technology Lonny Anderson said in an interview with Benjamin Wittes and Robert Chesney of the Brookings Institute. [read post]
19 Dec 2013, 2:30 pm by Sean Gallagher
"He didn't need to be a sysadmin to get to [the data]," NSA Director of Technology Lonny Anderson said in an interview with Benjamin Wittes and Robert Chesney of the Brookings Institute. [read post]
20 Sep 2010, 7:47 am by Jacqui Cheng ars technica
After all, there are numerous says for sysadmins to add extra layers of security for when users check their e-mail from outside the building, but switching everything to Gmail means that everything is left behind a single—and possibly insecure—password. [read post]
29 Jul 2008, 4:02 am
Negligence for sysadmins who don't patch? [read post]
20 Mar 2010, 10:11 am by Simon Fodden
Hot off the presses from Rich McCue, sysadmin at UVic Law: UVic Law Student Technology Survey 2010. [read post]
6 Dec 2018, 5:53 pm by Danny O'Brien
Both countries now claim the right to secretly compel tech companies and individual technologists, including network administrators, sysadmins, and open source developers – to re-engineer software and hardware under their control, so that it can be used to spy on their users. [read post]
24 Mar 2009, 4:30 am
Entrepreneurs, innovators, sysadmins, programmers, designers, games developers, hardware experts, tech journalists, tech consultants. [read post]
5 Jun 2014, 7:30 am by Katitza Rodriguez and Nadia Kayyali
Hackers at the NSA target sysadmins, regardless of the fact that these sysadmins themselves may be completely innocent of any wrongdoing. 9. [read post]
7 Oct 2020, 4:32 pm by rainey Reitman
This included logging into computers under an administrator account and then installing what they wanted, and sometimes deleting the administrator account, so that the military sysadmin had to wipe and reimage computers again and again. [read post]
1 Apr 2015, 2:56 pm by Bill Budington
Sysadmins can deploy HTTPS, making it harder for malicious agents to modify traffic in-transit. [read post]
4 Aug 2014, 12:03 pm by April Glaser
By setting up a reverse domain name for the IP address running the Tor node, you can help to alleviate knee-jerk reactions from sysadmins and people who see unfamiliar traffic coming from your IP node. [read post]
25 Jun 2018, 9:20 am by Sydney Li
STARTTLS Everywhere provides software that a sysadmin can run on an email server to automatically get a valid certificate from Let’s Encrypt. [read post]
28 Dec 2018, 7:14 am by Nate Cardozo
Incredibly, and unlike the UK’s Investigatory Powers Act, this includes the power to compel individual network administrators, sysadmins, and open source developers to comply with secret demands, including potentially to force them to keep their cooperation secret from their managers, lawyers, and executive leadership. [read post]
22 Dec 2014, 3:06 pm by Parker Higgins
It's hugely valuable for sysadmins, web developers, cryptographers, and anyone who just wants to understand what makes the secure Internet tick. [read post]