Newsletter Archive: 2011


Is Mac Security A Fallacy?ch
One of the major appeals of the Mac computer environment is the security that comes with them. For years, the common refrain for Mac computers was they...

Date: 2011-05-19
Password Policies and a Two-Tier Approach
Passwords are the first line of defense. Some would consider this secondary to firewalls and other road blocks. However, many attacks are from inside the network, and once outside attacks have gotten inside, passwords still remain a defense.

Date: 2011-05-12
What to Look For In Cloud Computing
The concept of cloud computing - the process of allocating resources of a group of networked computers - has been growing in popularity at an accelerated rate So much so, in fact, the concept can be obfuscated to the point where the concept does not fit the type of computing being done, all in hopes of sounding current.

Date: 2011-05-05
2010 Archive
2008 Archive
2009 Archive
2008 Archive
2007 Archive
2006 Archive
2005 Archive