At the time of this writing, the feature list is probably not yet complete. I will update this list whenever I stumble upon a new feature and post the update in the 4sysops news streams

Link : 4sysops.com

Read More

This week Apple rolled out a new version of Safari that includes a security-related feature aimed at Mac OS X 10.6 (Snow Leopard) and OS X Lion.

If you read Apple’s official announcement, you might think that Safari 5.1.7 will protect you from exploits that target vulnerabilities in outdated versions of Adobe Flash Player. That would be a fine feature indeed, except that Apple’s more detailed documentation says it does no such thing.

Source : www.zdnet.com/blog/bott

Read More

It’s been said, Microsoft Windows 8 won’t include DVD playback. Not necessarily a bad thing.

If you want to understand a little bit more about this, I suggest the 2 following articles by Ed Bott (ZDNet) :

Read More

XPERF, also known as Windows Performance Analyzer, ships as part of the Windows Performance Tools (WPT) kit. The latest WPT ships as part of the Windows SDK for Windows 7 and .NET Framework. The WPT consists of:

  • XPERF – an interactive trace capturing tool used in this case to enable ETL tracing of a slow user logon clearly not caused by the background loading of the OS (that is, a slow boot).
  • XBOOTMGR – enables ETL tracing, reboots the host computer then stops capturing N # of (default 120) seconds after user logon for 1) slow boot scenarios and 2) slow logons caused by delays in the OS boot process.
  • XPERFVIEW – views ETL traces captured by XPERF or XPERFVIEW in a graphical format linked with rich numerical reports and stack traces data to drill into delays for impacted and root cause components and functions.

Source : social.technet.microsoft.com/wiki

Read More

This breakdown of Kerberos settings and how they correspond to AD provides much-needed clarity

This ongoing need to clarify how Kerberos works and how it fails is a result of the fact that—although Kerberos remains the same—the services that use it and the ways they use it are often unique. The aspects that remain the same in each scenario, however, are what the settings in Active Directory (AD) are intended to address, and the difficult-to-interpret messages you’ll see when things fail.

Source : www.windowsitpro.com

Read More

A pair of high-profile malware attacks have given Apple a crash course in security response. Based on recent actions, 70 million current Mac owners have a right to expect much more from Apple than they’re getting today.

Eugene Kaspersky last week argued that Apple is “ten years behind Microsoft in terms of security.”

Source : The Ed Boot Report

Read More
Next PostNewer Posts Previous PostOlder Posts Home