73 Results for:CD-ROM
- Sort by:
What is VMware Remote Console and how do you run it?
04 Jan 2018A vSphere administrator can use VMware Remote Console to remotely access a VM's peripherals, configuration and desktop remotely through the vSphere Web Client. Read More
USBAnywhere vulnerabilities put Supermicro servers at risk
04 Sep 2019Security researchers discovered BMC vulnerabilities -- dubbed USBAnywhere -- in Supermicro servers that could put systems at risk of remote attacks via virtualized USB drives. Read More
Inside IncludeOS - what is a unikernel?
31 Jul 2018IncludeOS is a unikernel, a special type of library operating system that allows developers to write and run their application in the cloud... in place, that is, of a more traditional OS. ... Read More
The channel: Four decades of change
30 Sep 2022To celebrate MicroScope’s 40th anniversary, we ask channel leaders to reflect on the changes seen over the past four decades – a shift to software, and the emergence of the managed service provider and the cloud ... Read More
Apricorn Aegis Secure Key 3.0… your whole (data) life in your pocket
10 Sep 2020Put yourself back somewhere in between punch cards (pre-dating the 1970s and earlier) and onward to the proliferation of the (8-inch) floppy-disk and subsequently the 3 1⁄2-inch floppy disks that ... Read More
What is the difference between memory and storage?
16 Jun 2020Storage and memory, while connected, fulfill separate roles in a computer. Memory meets temporary data access needs and storage retains data and other files over the long term. Read More
How to upgrade from VCSA 6.5 to 6.7 -- both online and off
11 Nov 2019Use the online VCSA management interface, VAMI, or an ISO file from VMware to get started with your online or offline VCSA upgrade. Read More
At least 47,000 servers vulnerable to remote attack
03 Sep 2019All organisations using Supermicro servers are being urged to update firmware to block remote attacks exploiting vulnerabilities in baseboard management controllers Read More
How are Windows shortcut files vulnerable to attacks?
10 Oct 2017A Windows vulnerability targets shortcut files and enables hackers to automatically execute code. Expert Judith Myerson explains the flaw and how to stop it. Read More
How does Google's new detection model find bad Android apps?
27 Aug 2018Malicious apps have been a consistent problem for the Google Play Store, so a new detection model has been released to help clean it up. Learn how this system works with Nick Lewis. Read More