Do you have a Ubiquiti Unifi wireless system setup for wireless access? Ubiquiti offers really great “enterprisey” products for the price that are ve…
Read moreWe all love the new vSphere releases as they generally bring about great new functionality and capabilities as we have seen with the recent release o…
Read moreTrusted PC (TC) is a controversial technology platform that integrates PC security and integrity. It is a PC with built-in security mechanisms, thus …
Read moreThe issue of storing passwords in a database is one that requires looking closely at data encryption and Security protocols that will stop these va…
Read moreIf you are like me, you have used VMware Workstation for years now and have seen it go through a tremendous amount of changes and added features and …
Read morePassword salting is a form of password encryption that involves appending a password to a given username and then hashing the new string of character…
Read moreLarge-scale integration (LSI) is the process of integrating or embedding thousands of transistors on a single silicon semiconductor microchip. LSI te…
Read moreA trusted platform module (TPM) is a type of secure cryptoprocessor, which is a specialized chip used to carry out cryptographic operations like the …
Read moreThe Trusted Computing Group (TCG) is an international industry standardization group, a consortium initiative started by leaders in the computing ind…
Read moreTrue Ultimate Standards Everywhere, Inc. (TRUSTe) is a data privacy management (DPM) company that specializes in Internet privacy. It is best known f…
Read moreA trusted computing base (TCB) refers to all of a computer system's hardware, firmware and software components that combine to provide the system…
Read more