by aharned | Feb 12, 2015 | Apple, Macintosh, Tech Tips
It’s no secret that there have been some issues within the last few years between the folks at Apple, and the folks at Oracle, who now own the rights to the Java language and software engines. Due to several security concerns, Apple, along with several other...
by aharned | Nov 4, 2014 | News
Unix and Linux administrators have long been used to the concept of Elevated privileges, however the same concept doesn’t quite exist in the Windows Environment. The concept is simple: It is considered best practice that a user (even an administrator) of a...
by aharned | Sep 30, 2014 | News, Security
If you haven’t heard, a recent security flaw known as the Bash Bug has been discovered, and threatens to compromise quite a few internet-connected systems. This vulnerability is relatively wide-spread and can affect devices from major web servers to small-scale...
by aharned | Jun 4, 2014 | Routing and Switching
There have been many advancements in networking technology to allow the extension of Business Networks between multiple locations, allowing customers and employees at Satellite or Home offices to access the same resources as if they were plugged in at Corporate...
by aharned | May 6, 2014 | News, Security, Storage, Tech Tips
The Macintosh OSX platform is based on Unix, and thus, the POSIX permissions model. With OSX, you can augment these permissions with Access Control Lists (ACLs), which allow for more granularity (very similar to Windows-based permissions), however troubleshooting them...
Recent Comments