A

Spammers and phishers often forge email “from” addresses to make their messages look legit. DKIM (DomainKeys Identified Mail) is a tool designed to help these forgeries. The idea behind DKIM is straightforward: an outgoing mail server digitally signs an email message and the receiving system, or perhaps the mail client itself, verifies the signature. In […]
Read More ›

The New CWE List is Out: There Are A Lot of Familiar Entries

The first step in solving a problem is to recognize that it does exist. Zig Ziglar It is important for us to know what the weaknesses in computer systems in order to know how to secure them. To that end MITRE maintains lists of computer vulnerabilities and weaknesses in software systems. They recently updated the […]
Read More ›

Data Presentation Tips

When we present data in a report or spreadsheet we often use some type of graph or chart to make the information clearer to understand. Unfortunately, using the wrong type of presentation can confuse the reader. Consider these data: And these two presentations: Intuitively, the second seems easier to read, but why? The first is […]
Read More ›

Azure Data Studio: SQL Server Tools for Linux, Mac, Oh, and Windows Too

What do you do if you think the name “SQL Operations Studio” isn’t quite exciting enough? Well, if you are Microsoft, you lead with the word “Azure”, as in Azure Data Studio. Don’t be fooled by the name; The Azure Data Studio is not just for Azure databases. Not only is the Azure Data Studio […]
Read More ›

Deepfakes: Beauty and Ugliness

This whole deepfake thing has me concerned and bordering on frightened. And I’m not the only one. I wrote earlier about how neural networks can make realistic-looking faces. They are getting better. A whole collection of the faces is now available for free. These are faces of people who do not exist at all. Samsung […]
Read More ›

Type to search blog.learningtree.com

Do you mean "" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.