beca - News, Features, and Slideshows


  • How to choose the right Linux distro

    Unlike most other desktop and server operating systems, Linux comes in a wide variety of flavors, each based on a common core of the Linux kernel and various GNU user space utilities. If you're running Linux servers -- or Linux desktops, for that matter -- you should understand the important differences and be discerning about which flavor of Linux is best suited to any given situation. This article will help you do just that. 

    Written by Paul Venezia24 Sept. 14 20:09
  • A wireless router may someday charge your mobile devices

    For all intents and purposes, the new Apple Watch is not a mobile device that uses wireless charging. While its charging cable uses magnetic inductive coupling, the wire must still physically attach to the watch in order to work.

    Written by Lucas Mearian15 Sept. 14 23:02
  • Europe has a love/hate thing for U.S. tech

    Europe has declared war on U.S. tech companies, but despite this all-out assault, Europeans themselves still love American tech.

    Written by Preston Gralla12 Sept. 14 23:39
  • NIST issues Best Practices on how to best use Secure Shell software

    The Secure Shell (SSH) protocol and software suite is used by millions of system administrators to log into application and service accounts on remote servers using authentication methods that include passwords, tokens, digital certificates and public keys. But when improperly managed, SSH keys can be used by attackers to penetrate the organization's IT infrastructure.

    Written by Ellen Messmer03 Sept. 14 02:23
  • Drivers want their cars to get to know them better

    Consumers want their vehicles to anticipate their personal technology demands and to provide the same functionality as their mobile devices, according to a survey.

    Written by Lucas Mearian29 Aug. 14 23:06
  • New security tools from Tenable, HP, Co3 attempt the impossible

    Automated incident response is one of the fastest growing fields in computer security. Alternatively called threat monitoring, vulnerability management or threat management, it encompasses the seemingly impossible task of defending a network from active threats as they happen, in addition to detecting every possible vulnerability that could be exploited by an attacker.

    Written by By John Breeden II11 Aug. 14 23:20
  • 'Nadella Effect' makes Ballmer $US2.8bn richer

    Former Microsoft CEO Steve Ballmer's 'devices and services' strategy may be in tatters, discarded by his successor, Satya Nadella, but Ballmer must be smiling all the way to the bank.

    Written by Gregg Keizer22 July 14 21:12
  • Why are phishers targeting gamers? 'Cause that's where the money is ...

    There's a story that when the notorious bank robber "Slick Willie" Sutton was asked why he robbed banks he replied "Because that's where the money is" (see Sutton's Law). As a strategy for maximizing the potential "take home" Sutton was, if you'll forgive the pun, right on the money even if the risk was higher than, say, knocking over a supermarket.

    Written by Mark Gibbs30 June 14 22:40
  • FBI warns businesses 'Man-in-the-E-Mail' scam escalating

    For more than a year, the I Internet Crime Complaint Center (IC3) is warning businesses to be on the lookout for growing scam that tricks them into paying invoices from established companies that look legitimate but in fact are fraudulent.

    Written by Michael Cooney28 June 14 03:58
  • Gartner: IT leaders need to find their inner ferocious pack animal

    Gartner analyst Tina Nunno, author of a book called "The Wolf in CIO's Clothing," wants IT leaders to find their inner ferocious pack animal not only to be able to snarl at enemies challenging them but to better inspire team cohesion through displays of power, and yes, cunning.

    Written by Ellen Messmer26 June 14 04:39