Iranian government under new legislation all agencies must plan for migration projects migrating computer operating systems from Windows to Linux. General Manager of Communications and Information Technology said in an Interview today, with irinn.
Mr Shahami said "its much better for us to use an open source software becuase everyone can use it and make changes".
In Iran Communication and Information Technology organization we use already Linux and we are happy and safe with no costs ,Add Mr Shahami.
This document details a denial of service vulnerability I've recently discovered in current versions of Microsoft Windows. If, from user mode, you a make very specific set of operating system calls you can cause your entire Windows Operating System to blue screen. The complete code (in C) used to trigger the bug as well as a makefile can be found at the end of the document, USE AT YOUR OWN RISK, the author is not liable for any damage you manage to inflict upon your machine while running it.
Mikko Hyppönen is the Chief Research Officer for F-Secure. He has worked with F-Secure in Finland since 1991.
Since the 1990s, Hyppönen has assisted law enforcement in the United States, Europe and Asia on cybercrime cases and advises governments on cyber crime. His team has been responsible for taking down the Sobig.F botnet. Hyppönen has keynoted or spoken at various conferences around the world, including RSA, Black Hat and DEF CON.
Beware any emails which claim to come from firstname.lastname@example.org - it could be that you're being targeted in an attack designed to steal your AOL, Gmail, Yahoo or Windows Live password.
At first glance, if you don't look too carefully, the emails entitled "Microsoft Windows Update" may appear harmless enough. But the grammatical errors and occasional odd language should raise alarms bells that the emails may not really be from Microsoft.
With the upcoming Windows 8, Microsoft hopes to finally make Windows a serious contender in the tablet market and to offer a consistent user experience across all Windows devices. Our examination of prerelease software suggests that Microsoft has achieved much of that ambition. However, the company has also created challenges for users that in some ways may increase their security risks.
New research from M86 Labs adds further insight on the MIDI exploit first highlighted by Trend Micro last week.
The attack uses the methodology described by Vupen; a non-trivial exploit that works in Internet Explorer 6 to 9. Microsoft fixed this vulnerability in its January patch release.