Featured Article

Diagnosing and repairing Events 1030 and 1058
by ChiefIT
10 comments
Well, events 1030 and 1058 are very generic errors and can be caused by one of many different reasons. I often see questions at Experts Exchange on how to overcome these events. I don't have all the answers, but have helped out a lot of people diagnose and fix these events.

Get Access

Access our full library of articles written by our technology community. Read how-to guides, new perspectives on trending tech, and exclusive insights on industry news.

Articles For You

  • Information Technology Audit in Nutshell
    by madunix
    An audit is a systematic assessment of the security controls of information systems. It involves the evaluation of the information systems-related controls implemented by the management to ensure the achievement of control objectives.
  • The Principles Of Information Cybersecurity: CIA Triad
    by madunix
    Any organization's cybersecurity strategy should aim to protect the (CIA) confidentiality, integrity, and availability of its information systems. Altogether, these three elements are referred to as the CIA triad.
  • Top 5 Browser Extensions for 2020
    A listicle showcasing my favourite Top 5 Web Browser extensions for 2020...
  • Using Bitlocker to encrypt virtual machines
    by McKnife
    This is another small article in my Bitlocker article series. It is about encrypting virtual machines. The scenario that I am securing the VM against, is that an attacker has physical access to the host and is trying to read out the virtual hard drive of the guest systems.
  • How to use a custom language switcher with Transposh to build a multi-language Wordpress website
    How to build a multilingual website in Wordpress using the plugin Transposh and a custom language switcher. To do it, we'll have to use some plugins and learn how to load and use our custom javascript code.
  • Converting BYTES to CHAR on Oracle database
    In this article, I will be sharing the issues that we faced while converting the data type and NLS semantic to CHAR from BYTES. This was one of the business use cases where we needed to convert the entire columns throughout the schema from BYTES to CHAR types only for VARCHAR2 columns datatypes.
  • Bitlocker and multi-booting
    by McKnife
    If you are asking yourself "will Bitlocker allow me to install several encrypted instances of windows 10 on the same drive?", here is your answer.
  • Threat Modeling Process: Basics and Purpose
    by madunix
    2 comments
    The threat modeling process is iterative; it takes inputs and generates outputs for each step in the process; it outlines the possible attacks that could be made on your application/system; including how severe a threat is and how much damage it could do.

Newest Articles

Featured Author

Senior Data Analyst
CERTIFIED EXPERT

Veteran in computer systems, malware removal and ransomware topics.  I have been working in the field since 1985.

Popular Articles

Join a collaborative community of technology professionals.