Ivan Piacun MIITP CITPNZ

51 Flips | 2 Magazines | 2 Likes | 1 Following | 19 Followers | @ivanpiacun | Senior Developer and Senior Database Administrator at AgResearch Ltd

If You Use Word, You Need to Turn Off This One Feature

Our final day of the security challenge has a task for all the Office users out there.<p><b>This post is part of a weeklong series to help our readers improve their digital security.</b> <b>Follow along here.</b><p><b>Day Seven: Disable Macros in Word</b><p>If you use Microsoft Word for work and don’t use macros, disable them. …

How To Scan Your Computer For Malware With Google Chrome

In the 9-plus years it’s been around, Google Chrome has become one of the best — and most popular — web browsers in the world. One reason for its rapid rise has been Google’s focus on security.<p>Protecting Chrome users from malware remains a top priority today. What you may not have realized is that …

Google Chrome

MIT Develops Hack-Proof RFID Chip — Here's How It Works

Do you know about RFID chips and how many you are carrying at this moment?<p>Today, RFID chips are built-in all sorts of items, including your credit …

Identifying High-Impact Queries and Stored Procedures with Dynamic Management Views

Troubleshooting performance issues in the heat of the moment when you have managers, engineers, developers, and the occasional stray C-level …

Pentagon Considers Turning Cell Phones Into Walkie-Talkies During Emergencies

Let’s say it’s 2016 and the government has a message to get out to the public—ISIS is believed to be waging an attack on cell-phone towers in the …

How To Be A Successful DBA

I just read Thomas LaRock's article, How to become an effective database administrator, published on ITProPortal. I like his list of five things …

Wikileaks leak shows data sovereignty threat

A leak of documents from the Trade in Services Agreement negotiations show Australia and other negotiating parties would be prevented from ensuring …

Foreign Key Constraints: Friend or Frenemy?

In the early 1970's, Edgar F. Codd, a pioneer of the relational model for databases, gave us the rules of normalization to help us design and …

Tell Windows 8.1 You Have a Metered Connection to Restrict Data Usage

If you use a personal hotspot or tether your phone, you need to keep an eye on your data usage. Windows 8 lets you set a connection as "metered" to …

Companies warned of major security flaw in Google Play apps

University researchers have found that developers often store authentication keys in the Android apps on Google Play, making it possible for …

Hacker puts 'full redundancy' code-hosting firm out of business

A code-hosting and project management services provider was forced to shut down operations indefinitely after a hacker broke into its cloud infrastructure and deleted customer data, including most of the company’s backups.<p>The customers of CodeSpaces.com, run by a company based in Wayne, New Jersey, …

Why We Need to Tame Our Algorithms Like Dogs

There is a theory among evolutionary anthropologists that dogs evolved from beasts to pets because the canines that continued to survive were those …

95% of successful security attacks are the result of human error

It’s all your fault.<p>At least it is to security researchers at IBM, who just released a rather comprehensive and compelling Cyber Security Intelligence Index that asserts that 95 percent of successful hack attacks or incidents were because of some type of human error.<p>But there’s good news here. The …

Backup More Than 1GB per Second Using SQL2008 Backup Compression

Backup Compression in SQL2008 performs very well and it is easy to use. You could either use “With Compression” along with the “Backup” command or …

U.S. Government Believes It Has Rights to Foreign Cloud Data, Microsoft Disagrees

I'm not sure why the U.S. government is so intent on destroying relationships with foreign governments, or hampering the potential of a Cloud …

Twitter awaits investors' verdict on faltering market performance

Dick Costolo has a problem. When the markets close on Tuesday, the Twitter boss will update investors for just the second time about the social-media company’s financial fortunes. Last time, they didn’t like what they heard.<p>The eight-year-old company is almost ubiquitous in medialand. TV shows, …

'Dark Wallet' Is About to Make Bitcoin Money Laundering Easier Than Ever

Government regulators around the world have spent the last year scrambling to prevent bitcoin from becoming the currency of choice for money …

ScottGu's Blog - Azure: 99.95% SQL Database SLA, 500 GB DB Size, Improved Performance Self-Service Restore, and Business Continuity

Hello Scott,<p>Can we except some kind of announcement/guidance about the deprecation of Azure SQL Federation?<p>Any updates on supporting TDE? Thanks!<p>In …

Microsoft Adds Printing Capability to Office for iPad

Microsoft's release of Office for the iPad won the company many accolades from the industry and consumers. Apple CEO, Tim Cook, even chided Microsoft …

Introducing Enhanced Mitigation Experience Toolkit (EMET) 4.1

In June 2013, we released EMET 4.0 and customer response has been fantastic. Many customers across the world now include EMET as part of their …

MasterPass launch in NZ: ‘The future of e-commerce’

MasterCard has launched a digital payments platform in New Zealand that's accessible by any device. It believes this will be a standard feature for …

Australia, US, UK advise avoiding Microsoft Internet Explorer until bug fixed

The recently established UK National Computer Emergency Response Team issued similar advice to British computer users, saying that in addition to …

Buying Alcohol with Bitcoin Is Now Illegal in Ohio, For Some Reason

Can a cryptocurrency thrive if you can’t use it to buy booze?<p>Image: Zach Copely/Flickr<p>Can a cryptocurrency thrive if you can’t use it to buy booze? Bitcoin enthusiasts in Ohio are going to find out. The Ohio Department of Public Safety announced last week that you can't use Bitcoin to buy alcohol …

From the MVPs: Understanding the Windows Server Failover Cluster Quorum in Windows Server 2012 R2

<i>This is the 40th in our series of guest posts by Microsoft Most Valued Professionals (MVPs). You can click the “MVPs” tag in the right column of our</i> …

Homeland Security Now Warning Against Using Internet Explorer Until Vulnerability is Resolved

You know the stuff is getting serious when Homeland Security steps in and starts warning the public about using a specific piece of software. The …

Outrage over net neutrality decision heard ‘round the Internet

The Federal Communications Commission's proposed new rules for net neutrality touched off a firestorm across broad sections of the Internet this …

Hackers find first post-retirement Windows XP-related vulnerability

Microsoft has informed customers that cyber-criminals are exploiting an unpatched and critical vulnerability in Internet Explorer (IE) using …