fbpx
 

Month: September 2014

Ethical Hackers Find Oracle Vulnerability

CNN recently interviewed two hackers Bryan Seely Ben Caudill, who discovered an unsettling security hole, uncovering intimate details like children’s school records, including detailed bus route information; arrest and prosecution information from a major Midwestern city; and the real names and numbers of intelligence agents visiting a major American port.

Guest Blog: Paul Vallee, Pythian on Bash

A new vulnerability in a utility called “Bash”, a commonly-installed command execution shell, was discovered yesterday. This vulnerability has been termed “SHELLSHOCK” by the media. Pythian’s systems were patched overnight and are no longer vulnerable. This vulnerability only affects Linux systems, so if you are not running Linux on your data center servers this vulnerability does not apply to you. What is Bash? Bash is a “shell”—a basic component that enables interaction between a human and an operating system, in this […]

Microsoft licensing lessons learned – Mobility, BYOD and Desktop Virtualization?

Neither BYOD and/or desktop virtualization are inherently bad. If the funding is there for the correct licensing and the benefits of improved security and device and account management are realized, these approaches can be quite favorable to you. Server virtualization is the generally accepted standard, the dominant model if you will. Today’s servers are far too massive, far too dense for single applications and perhaps more importantly, far too massive and dense for licensing. Microsoft has moved towards its Core […]

In Archive