background preloader

InformIT: The Trusted Technology Source for IT Pros and Developers

InformIT: The Trusted Technology Source for IT Pros and Developers

http://www.informit.com/

Related:  Information technology (IT)Programacion

Comparison of firewalls Firewall software[edit] Ultimately, all firewalls are software-based[citation needed], but some firewall solutions are provided as software solutions that run on general purpose operating systems. The following table lists different firewall software that can be installed / configured in different general purpose operating systems. Firewall appliances[edit] In general, a computer appliance is a computing device with a specific function and limited configuration ability, and a software appliance is a set of computer programs that might be combined with just enough operating system (JeOS) for it to run optimally on industry standard computer hardware or in a virtual machine. The following table lists different firewall appliances.

Simon Jackson's Blog - Mastering Unity 2D Game DevelopmentAnimation Curves The following blog post, unless otherwise noted, was written by a member of Gamasutra’s community. The thoughts and opinions expressed are those of the writer and not Gamasutra or its parent company. In the run up to the launch of my first published title (a book this time) I’ve done some short snippets from some of the many exciting things you will learn within its pages. The sample project and code for this snippet can be found here: – AnimationCurves.zip *Edit – seems only 5 minutes since I posted this article and already we fine other useful frameworks to assist with using AnimationCurves on their own. This handy little project enables some interesting Editor enhancements to allow copying, pasting and even the extraction of animation steps from a curve.

Ross Anderson's Home Page Ross Anderson [Research] [Blog] [Politics] [My Book] [Music] [Contact Details] What's New Security protocols and evidence: where many payment systems fail analyses why dispute resolution is hard. Comparison of antivirus software Legend[edit] The term "on-demand scan" refers to the possibility of performing a manual scan (by the user) on the entire computer/device, while "on-access scan" refers to the ability of a product to automatically scan every file at its creation and/or subsequent modification. The term "CloudAV" refers to the ability of a product to automatically perform scans on the cloud. The term "Web protection" usually includes protection from: infected and malicious URLs, phishing websites, online identity protection (privacy) and online banking protection. Many antivirus products use "third-party antivirus engine", this means that the antivirus engine is made by another producer, however the malware signature and/or other parts of the product may (or may not) be done from the owner of the product itself.

History of Computer Security Early Computer Security Papers, Part I This list of papers was initially distributed on CD-ROM at NISSC '98. These papers are unpublished, seminal works in computer security. Large collection of Free Microsoft eBooks for you, including: SharePoint, Visual Studio, Windows Phone, Windows 8, Office 365, Office 2010, SQL Server 2012, Azure, and more. - Microsoft SMS&P Partner Community Blog - By Eric Ligman - Site Home - MSDN Blog Throughout the year I try to share resources and information with you that I think will be helpful for you. Often times these resources will include links to free eBooks that we make available on a variety of topics. Today, I thought I would post a large collection of eBooks for you here so that you can find them in one place and consume them as you see fit. Also, if you find this list helpful, please share it with your peers and colleagues so that they too can benefit from these resources. Due to the incredible popularity of this post, I’ve added a second post on even MORE free Microsoft eBooks and Resource Kits available for you, in case you are interested.

SQLZOO Learn SQL using: SQL Server, Oracle, MySQL, DB2, and PostgreSQL. Reference: how to... How to read the data from a database. 2 CREATE and DROP 70 Things Every Computer Geek Should Know. The term ‘geek’, once used to label a circus freak, has morphed in meaning over the years. What was once an unusual profession transferred into a word indicating social awkwardness. As time has gone on, the word has yet again morphed to indicate a new type of individual: someone who is obsessive over one (or more) particular subjects, whether it be science, photography, electronics, computers, media, or any other field. Site-to-site IPsec VPN with two FortiGates - Fortinet Cookbook Share this post: In this example, you will allow transparent communication between two networks that are located behind different FortiGates at different offices using route-based IPsec VPN. The VPN will be created on both FortiGates by using the VPN Wizard’s Site to Site FortiGate template.

25 Best SSH Commands / Tricks - StumbleUpon OpenSSH is a FREE version of the SSH connectivity tools that technical users of the Internet rely on. Users of telnet, rlogin, and ftp may not realize that their password is transmitted across the Internet unencrypted, but it is. OpenSSH encrypts all traffic (including passwords) to effectively eliminate eavesdropping, connection hijacking, and other attacks.

Related: