Microsoft on Thursday said it has acquired privately held Stratature, a company that specializes in so-called master data management software. Through the acquisition of the , Microsoft will build master data management tools into its Office System line. The move complements the company’s strategy to bulk up the business intelligence tools in Office and SQL Server. describes a way to …
Read More »Think network architecture, not more bandwidth
At last week’s Interop shindig, Cisco Systems CEO John Chambers’ annual walk-about keynote presentation focused on “Web 2.0 creep” and its impact on the network. According to Chambers, enterprises will adopt Web 2.0 tools like blogs, wikis and Web video and bring today’s networks to their knees in the process. Â While I believe that the enterprise Web 2.0 trend is …
Read More »Norton AntiBot goes into public beta
These days criminal enterprises don’t just want to steal your Outlook contact list, they want to own your computer, and they will download a remote-access Trojan horse at the first available opportunity. Within the last six months, Symantec has seen the number of these “bot” infections increase 29 percent over the previous six months. That’s why Symantec is rushing to …
Read More »Fedora 7
Fedora 7 was released last week, a little bit behind schedule, with a spate of new features, updates, and live CD installable “spins” of Fedora in KDE and GNOME flavors. I found a lot of good in this release, but a bug in the FireWire stack that attacked my external backup drive made this release just a little shy of …
Read More »SQL Injection Scanner
SQL Injection merupakan teknik hacking paling populer pada aplikasi web dengan prinsip melewatkan perintah-perintah SQL lewat aplikasi web untuk dieksekusi oleh database back-end. Kelemahan akan muncul apabila inputan user tidak disaring/difilter dengan sempurna dan akhirnya dieksekusi. Mengidentifikasi kelemahan SQL Injection akan melibatkan proses auditing aplikasi web secara keseluruhan, cara paling ampuhdan efektif menurut security-hacks.com adalah dengan menggunakan SQL Injection Scanner. …
Read More »Tawaran menarik bagi ISP
Apakah Anda tertarik dengan bisnis ISP? Atau barangkali sudah memulai bisnis tersebut tetapi masih banyak kendala teknis dalam pengoperasiannya. Kali ini Google menawarkan kerjasama bagi ISP, portal maupun Service Provider yang tertarik dengan layanan Google Apps. Program ini bertajuk Partner Edition yang memungkinkan ISP untuk memberikan fasilitas pada client seperti Gmail, Google Calendar, dan Google Docs & Spreadsheets tanpa perlu …
Read More »Phishing with Google
Posting singkat tentang vulnerable pada situs Google yang bisa dimanfaatkan oleh phiser untuk memanen username+password calon korbannya! Beware of phisers! Link: Google phishingUpdate: Bingung?? Jika Anda mempunyai account Google Adsense dan mendapati email yang seolah-olah berasal dari Google yang meminta Anda mengupdate informasi personal Anda, kemudian di bagian bawah email itu disertakan link seperti di atas (Anda pasti tidak mengira …
Read More »Securing the connection between MySQL and MySQL Administrator using an SSH tunnel
This is a description of how to set up a secure tunnel between your MySQL Server and a locally running MySQL Administrator using Putty. By creating a secure tunnel to your MySQL server using Putty, you can grant localhost access to powerful applications like MySQL Administrator while at the same time, make your server appear as if it isn’t even …
Read More »Prevent Phishing with Mutual Authentication
Phishing is essentially a man-in-the-middle attack. The user is mis-directed, for example by social engineering or DNS-cache poisoning, to a fraudulent site. Because the user doesn’t understand how to validate SSL certificates (and who does?), the trick works far too often. Efforts such as Extended Validation certificates are bound to fail in many cases because they rely on inconsistent visual …
Read More »