Page 4,188«..1020..4,1874,1884,1894,190..4,2004,210..»

Learn about cryptocurrency mining with this interactive blockchain demo – TNW

In order to understand cryptocurrency youll need to grasp the fundamentals of blockchain. Luckily, someone made an interactive tutorial that not only explains the idea, but walks users through mining valid hashes with their CPUs.

Blockchain Demo overcomes part of the learning curve by showing you exactly what mining looks like. Its a creative way to adapt a useless form of mining for educational purposes. Youll need hardware like a miner a computer built for the job if you want to make any actual money.

Were past the days of adapting an old computer for the job, entry-level units have six GPUs. The bare-bones miner costs about $300, but considering many manufacturers have a minimum order amount, sometimes in the range of 100 units, this isnt a weekend hobby.

Credit: Blockchain Demo

Blockchain Demos creator,Sean Han, explained his project on Product Hunt:

Blockchain Demo is my attempt at demystifying the technology behind cryptocurrencies. It has a living blockchain, a peer-to-peer network, and a user tour.

Hans tool guides you through the process of mining a block using the same type of ledger technology powering Bitcoin.

For a deeper dive into the concept, you can also check out the inspiration for Blockchain Demo in this video by Anders.

Read next: This t-shirt subscription box is the epitome of startup fetishism

See the original post:
Learn about cryptocurrency mining with this interactive blockchain demo - TNW

Read More..

$160 Billion: Cryptocurrency Market Sets New All-Time High … – CoinDesk

Investment in cryptocurrencies continues to increase.

Spurred by increases in investment, the total value of the more than 800 publicly traded cryptocurrencies and crypto assets pushed past $160 billion for the first time ever, according to data provider CoinMarketCap.

With the move, the figure is now up 1,500 percent from the $10 billion observed at the start of the year.

Notably, the new high was set even as bitcoin, the market's largest asset, continued its recent pattern of sideways trading, hovering in the $4,400-range, or about 1% below its all time high of $4,522.13 on the CoinDesk Bitcoin Price Index (BPI).

Similar, ether and bitcoin were mostly flat on the day's trading.

At press time, it seemed most of the growth in the top 10 cryptocurrencies was consolidated to two assets, with Ripple's XRP token and monero's XMR token rising 9% and 7.9%, respectively, over the last 24 hours.

On XMR's increase, the asset regained a spot in the top 10 cryptocurrencies by market capitalization after some time out of the spotlight.

Elsewhere, investment in litecoin appeared to cool after it set all-time highs earlier in the day's trading. After rising past $60 for the first time since the protocol was introduced in 2011, the token was down nearly 2%.

Ruler image via Shutterstock

The leader in blockchain news, CoinDesk is an independent media outlet that strives for the highest journalistic standards and abides by a strict set of editorial policies. Have breaking news or a story tip to send to our journalists? Contact us at [emailprotected].

See the article here:
$160 Billion: Cryptocurrency Market Sets New All-Time High ... - CoinDesk

Read More..

Quantum computing event explores the implications for business – Cambridge Network

A free, one-day 'Executive Track' on the issue - part of an international workshop on quantum-safe cryptography - takes place on Wednesday 13 September at the Westminster Conference Centre, London. It focuses on the implications for businesses and highlights developments underway to address them.

Government cyber-security agencies (UK, US, Canada) and experts from universities and industry (including Amazon, BT, Cisco and Microsoft) will present and discuss the issues and potential solutions to this fundamental technological development that threatens catastrophic damage to Government, industry and commerce alike.

Find out more and book your place at this free event here

The Executive Track on13 Septemberis designed for business leaders and will outline the state of the quantum threat and its mitigation for a C-level audience including CEOs, CTOs and CISOs.

Attendees will learn how quantum computers are poised to disrupt the current security landscape, how government and industry organisations are approaching this threat, and the emerging solutions to help organisations protect their cyber systems and assets, now and into the future of quantum computing.

___________________________________________________

See the article here:
Quantum computing event explores the implications for business - Cambridge Network

Read More..

Cost Reduction Strategies on Java Cloud Hosting Services – InfoQ.com

Key Takeaways

Cloud resources can be expensive, especially when you are forced to pay for resources that you dont need; on the other hand resource shortages cause downtimes. Whats a developer to do? In this article we will discuss techniques for determining the golden medium that lets you pay for just the resources you actually consume, without being limited as your application capacity requirements scale.

The first step to any solution of course is admitting that you have a problem. Below are some details on the issue that many cloud users face.

Almost every cloud vendor offers the ability to choose from a range of different VM sizes. Choosing the right VM size can be a daunting task; too small and you can trigger performance issues or even downtimes during load spikes. Over-allocate? Then during normal load or idle periods all unused resources are wasted. Does this scenario look familiar from your own cloud hosted applications?

And when the project starts growing horizontally, the resource inefficiency issue replicates in each instance, and so, the problem grows proportionally.

In addition, if you need to add just a few more resources to the same VM, the only way out with most of current cloud vendors is to double your VM size. See the sample of AWS offering below.

(Click on the image to enlarge it)

Exacerbating the problem, you need to incur downtime when you move, by stopping a current VM, performing all steps of application redeploy or migration, and then dealing with the inevitable associated challenges.

This shows that VMs are not quite flexible and efficient in terms of resource usage, and limits adjustment according to variable loads. Such lack of elasticity directly leads to overpaying.

If scale out is not helping to use resources efficiently, then we need to look inside our VMs for a deeper understanding of how vertical scaling can be implemented.

Vertical scaling optimizes memory and CPU usage of any instance, according to its current load. If configured properly, this works perfectly for both monoliths, as well as microservices.

Setting up vertical scaling inside a VM by adding or removing resources on the fly without downtimes is a difficult task. VM technologies provide memory ballooning, but its not fully automated, requiring tooling for monitoring the memory pressure in the host and guest OS, and then activating up or down scaling as appropriate. But this doesn't work well in practice, as the memory sharing should be automatic in order to be useful.

Container technology unlocks a new level of flexibility thanks to its out-of-box automatic resource sharing among containers on the same host, with a help of cgroups. Resources that are not consumed within the limit boundaries are automatically shared with other containers running on the same hardware node.

And unlike VMs, the resource limits in containers can be easily scaled without reboot of the running instances.

As a result, the resizing of the same container on the fly is easier, cheaper and faster than moving to larger VMs.

There are two types of containers application and system containers. An application container (such as Docker or rkt) typically runs in as little as a single process, whereas a system container (LXD, OpenVZ) behaves like a full OS and can run full-featured init systems like systemd, SysVinit, and openrc, that allow processes to spawn other processes like openssh, crond, or syslogd, together inside a single container. Both types support vertical scaling with resource sharing for higher efficiency.

Ideally on new projects you want to design around application containers from the ground up, as it is relatively easy to create the required images using publicly available Docker templates. But there is a common misconception that containers are good only for greenfield applications (microservices and cloud-native). The experience and use cases prove possibility to migrate existing workloads from VMs to containers without rewriting or redesigning applications.

For monolithic and legacy applications it is preferable to use system containers, so that you can reuse architecture, configuration, etc., that were implemented in the original VM design. Use standard network configurations like multicast, run multiple processes inside a container, avoid issues with incorrect memory limits determination, write on the local file system and keep it safe during container restart, troubleshoot issues and analyze logs in an already established way, use a variety of configuration tools based on SSH, and be liberal in relying on other important "old school" tasks.

To migrate from VMs, monolithic application topology should be decomposed into small logical pieces distributed among a set of interconnected containers. A simple representation of the decomposition process is shown in the picture below.

Each application component should be placed inside an isolated container. This approach can simplify the application topology in general, as some specific parts of the project may become unnecessary within a new architecture.

For example, Java EE WebLogic Server consists mainly of three kinds of instances required for running in a VM: administration server, node manager and managed server. After decomposition, we can get rid of the node manager role, which is designed as a VM agent to add/remove managed server instances, as now they will be added automatically by the container and attached directly to administration server using the container orchestration platform and a set of WLST (WebLogic Server Scripting Tool) scripts.

To proceed with migration, you need to prepare the required container images. For system containers, that process might be a bit more complex than for application containers, so either build it yourself or use an orchestrator like Jelastic with pre-configured system container templates.

And finally, deploy the project itself and configure the needed interconnections.

Now each container can be scaled up and down on the fly with no downtime. It is much thinner compared to virtual machines, so this operation takes much less time compared to scaling with VMs. And the horizontal scaling process became very granular and smooth, as a container can be easily provisioned from the scratch or cloned.

For scaling Java vertically, it is not sufficient to just use containers; you also need to configure the JVM properly. Specifically, the garbage collector you select should provide memoryshrinking in runtime.

Such GC packages all the live objects together, removes garbage objects, uncommit and releases unused memory back to the operation system, in contrast to non-shrinking GC or non-optimal JVM start options, where Java applications hold all committed RAM and cannot be scaled vertically according to the application load. Unfortunately, the JDK 8 default Parallel garbage collector (-XX:+UseParallelGC) is not shrinking and does not solve the issue of inefficient RAM usage by JVM. Fortunately, this is easily remedied by switching to Garbage-First (-XX:+UseG1GC).

Lets see the example below. Even if your application has low RAM utilization (blue in the graph), the unused resources cannot be shared with other processes or other containers as its fully allocated to the JVM (orange).

(Click on the image to enlarge it)

However, the good news for the Java ecosystem is that as of JDK 9, themodern shrinking G1 garbage collector is enabled by default. One of its main advantages is the ability to compact free memory space without lengthy GC pause timesand uncommit unused heap.

Use the following parameter to enable G1, if you use JDK lower than 9th release:-XX:+UseG1GC

The following two parameters configure the vertical scaling of memory resources:

Also, the application should periodically invoke Full GC, for example, System.gc(), during a low load or idle stage. This process can be implemented inside the application logic or automated with a help of the external Jelastic GC Agent.

In the graph below, we show the result of activating the following JVM start options with delta time growth of about 300 seconds:

-XX:+UseG1GC -Xmx2g -Xms32m

(Click on the image to enlarge it)

This graph illustrates the significant improvement in resource utilization compared to the previous sample. The reserved RAM (orange) increases slowly corresponding to the real usage growth (blue). And all unused resources within the Max Heap limits are available to be consumed by other containers or processes running in the same host, and not wasted by standing idle.

This proves that a combination of container technology and G1 provides the highest efficiency in terms of resource usage for Java applications in the cloud.

The last (but not least) important step is to choose a cloud provider with a "pay per use" pricing model in order to be charged only based on consumption.

Cloud computing is very often compared to electricity usage, in that it provides resources on demand and offers a "pay as you go" model. But there is a major difference - your electric bill doesnt double when you use a little more power!

Most of the cloud vendors provide a "pay as you go" billing model, which means that it is possible to start with a smaller machine and then add more servers as the project grows. But as we described above, you cannot simply choose the size that precisely fits your current needs and will scale with you, without some extra manual steps and possible downtimes. So you keep paying for the limits - for a small machine at first, then for one double in size, and ultimately horizontal scaling to several underutilized VMs.

In contrast to that, a "pay as you use" billing approach considers the load on the application instances at a present time, and provides or reclaims any required resources on the fly, which is made possible thanks to container technology. As a result, you are charged based on actual consumption and are not required to make complex reconfigurations to scale up.

(Click on the image to enlarge it)

But what if you are already locked into a vendor with running VMs, and youre paying for the limits and not ready to change it, then there is still a possible workaround to increase efficiency and save money? You can take a large VM, install a container engine inside and then migrate the workloads from all of the small VMs. In this way, your application will be running inside containers within the VM - a kind of "layer-cake", but it helps to consolidate and compact used resources, as well as to release and share unused ones.

Realizing benefits of vertical scaling helps to quickly eliminate a set of performance issues, avoid unnecessary complexity with rashly implemented horizontal scaling, and decrease cloud spends regardless of application type - monolith or microservice.

Ruslan Synytsky is CEO and co-founder of Jelastic, delivering multi-cloud Platform-as-a-Service for developers. He designed the core technology of the platform that runs millions of containers in a wide range of data centers worldwide. Synytsky worked on building highly-available clustered solutions, as well as enhancements of automatic vertical scaling and horizontal scaling methods for legacy and microservice applications in the cloud. Rich in technical and business experience, Synytsky is actively involved in various conferences for developers, hosting providers, integrators and enterprises.

See the original post:
Cost Reduction Strategies on Java Cloud Hosting Services - InfoQ.com

Read More..

Cloud Native The Perfect Storm for Managed SD-WAN Services – Network World

We are excited to announce today that Silver Peak has joined MEF. With 130+ members, MEFs new SD-WAN initiatives are intended to address implementation challenges and help service providers to accelerate managed SD-WAN service deployments. Some of this work involves defining SD-WAN use cases, and a key use case revolves around connecting distributed enterprises and users to cloud-hosted SaaS applications and IaaS.

Enterprise CIOs continue to accelerate the pace of corporate digital transformation initiatives, often including plans to migrate enterprise applications to the cloud. Cloud-first is often the preferable choice for hosting new applications, enabling enterprises to securely connect users to applications from anywhere and across any type of WAN service.

The migration from data center-hosted to cloud-hosted applications is a perfect storm for building an SD-WAN. The best-in-class SD-WAN solutions and services take an application-aware approach that focuses on performance and availability.

Internet-Destined Traffic on the Rise

Two years ago, as an analyst, one of the questions that I always asked of my enterprise clients was, what percentage of your applications traffic is destined for the Internet? At the time, that percentage was less than 50%. Today, based on many recent conversations with Tier 1 service providers and distributed enterprises, I estimate that the percentage of internet-bound traffic has increased to 85%.

However, using broadband Internet services for the enterprise WAN, particularly for accessing cloud-native applications, poses additional challenges for enterprises that are concerned with the security, performance and visibility of their applications and network.

In fact, according to a recent Frost & Sullivan SD-WAN blog, 43% of enterprises chose improved cloud connectivity to deliver a better SaaS experience as the second most compelling reason to deploy an SD-WAN solution.

Ensuring High-Quality Cloud Connectivity

So how do enterprise IT managers ensure the equivalent customer experience when it comes to performance, security and visibility for cloud-hosted SaaS applications in contrast to data-center hosted applications and irrespective of the underlying network connectivity?

A best-in-class SD-WAN cloud connect use case can address the performance, security and visibility challenges for both on-net and off-net sites and across any network service including broadband.

Today, managed service providers offer either private MPLS or Ethernet cloud connect services for enterprises to connect on-net branch sites to a limited set of SaaS and IaaS providers. There are four key challenges that may limit the opportunity to fully address the managed cloud connect market:

1. Existing service provider cloud connect service offerings for enterprise users across off-net sites must be backhauled to their nearest on-net provider PoP. This can introduce latency and adversely affect SaaS application performance.

2. The complexity of identifying and securing all of the enterprises SaaS applications traffic requires additional resources and security policy flexibility to integrate a secure web gateway, enterprise branch firewall, or network-based security service.

3. The requirement to identify, manage and prioritize trusted applications vs. personal web applications (YouTube, Facebook or Netflix) on the first packet is difficult once an application flow has been directed to a specific path.

4. There are incremental expense, time and capital resource requirements to establish direct cloud connect peering relationships with every SaaS provider and for all SaaS data center sites.

Silver Peak SD-WAN Addresses Cloud Challenges

The Silver Peak Unity EdgeConnectSP SD-WAN solution addresses a full spectrum of key requirements for developing and deploying a compelling SD-WAN cloud connect service that can address all four key challenges:

1. Dynamic and secure steering of cloud-destined application traffic to any SaaS provider

2. Policy-based automated local internet breakout for trusted cloud applications with First-packet iQ that identifies and classifies applications on the first packet of each connection

3. High-performance SaaS optimization which calculates the round-trip latency and automatically selects the optimal cloud connect path for 50+ SaaS applications

4. Simple security service chaining to secure web gateways and industry-leading next generation firewalls to support granular security policies for SaaS and web-based applications.

5. Minimize the requirement to backhaul all off-net cloud-destined applications to the nearest service provider MPLS PoP

By taking advantage of these advanced EdgeConnectSP features and capabilities, service providers can extend their existing cloud connect services beyond the MPLS private cloud connect use cases and offer an advanced SD-WAN Cloud Connect service. This creates an enormous opportunity for service providers to offer tiered, managed cloud connect services that enable SLAs for public, private on-net and off-net deployments of SaaS applications.

As a new MEF member, Silver Peak looks forward to contributing to and enhancing the service provider market opportunity for new on-demand, tiered managed SD-WAN services.

Read the original here:
Cloud Native The Perfect Storm for Managed SD-WAN Services - Network World

Read More..

Whatchu doin’ Upthere? Western Digital moves on cloud storage space – The Register

Western Digital Corporation has bought Upthere, a consumer data storage startup with its own public cloud.

Upthere was founded in 2011 by director Bertrand Sarlet, VP for business development Alex Kushnir, and Roger Bodamer. CEO Chris Bourdon joined Upthere as VP products in August 2012 after being Apple's senior product line manager in the Mac OS X area. He was promoted to CEO in December 2015 when Bodamer left.

Sarlet worked at Apple from 1997 to 2011, and was previously at Steve Job's NeXT.

The company, based in Redwood City, CA, stores users' data photos, videos, documents and music in its own data centre and says this about its core technology:

We believe that the time has come for the world to live off of the cloud on a day-to-day basis, not merely treat it as a secondary backup or sync location. This means, however, that writing to and reading from the cloud needs to be robust and fast enough to replace local storage. Rather than juggling multiple copies of a file between devices, our direct write technology keeps everything in the cloud, freeing the device to do what it does best creating and consuming content. In order to overcome the technical challenges of this new model of computing, we knew we needed to own, optimize, and deeply integrate each component in our system this is the primary reason we built our full technology stack.

Consumers run a local Upthere app on their iOS, Android, macOS and Windows devices.

On beta test exit the app was described as "a smarter way to keep, find, and share all of your files. Instead of storing your files on your devices which takes up lots of space, we safely and privately store your files directly in the cloud. Upthere breaks through the capacity limits of your devices providing one unified place for all your files that you can access from any device."

Upthere has had a single and large funding round of $77m in July last year, probably sparked by the successful beta. There were six investors: Elevation Partners, Floodgate, GV, Kleiner Perkins Caufield & Byers, NTT DOCOMO Ventures, and Western Digital Capital.

The acquisition price has not been revealed. We think it is well beyond $100m and gives WDC the ability to develop and operate its own cloud storage data centres around the world, using its own storage media drives to do so. This will put it into competition with all other consumer data storage and sharing businesses, such as Amazon, Box, and Dropbox.

The Upthere business will be folded into Western Digital's Client Solutions business unit, run by SVP and GM Jim Welsh. Chris Bourdon is joining WD's Client Solutions business as a strategic leader and the Upthere team is joining WD as well. Barbara Nelson, who recently joined WD from IronKey, where she ran the Imation-owned business, will run the Clouds Services business inside WD's Cloud Solutions unit.

Upthere pricing is $1.99/month and includes the Home app and 100GB of storage. There is a free three-month trial. Download the app here.

Sponsored: The Joy and Pain of Buying IT - Have Your Say

Continue reading here:
Whatchu doin' Upthere? Western Digital moves on cloud storage space - The Register

Read More..

Nearly 300 years worth of porn was recorded to test Amazon’s … – Neowin

In the present, just as in 1724, the human race found itself in an adventurous spirit, a spirit that asked big questions, a spirit that demanded to know what the boundaries were and to push the envelope. Beaston02 wanted to know if the unlimited cloud storage offered by Amazon was really unlimited, so he recorded live webcam porn to see if he could break the boundaries of "unlimited" cloud storage. And if you started watching his recorded porn back in 1724 you would only just have finished it.

Amazon suspended its unlimited storage option in June - many speculate that it was due to beaton02's giant porn stash - but he himself claims that decision has nothing to do with him. The Redditor claims that he has more of a problem with hoarding data than he does with porn, as the whole thing started out as a part of a bigger project to learn new code and to test himself to see how much data he could capture.

So he set off and after 5 to 6 months he had captured nearly 2 petabytes (1.8) of pornography by setting up a number of programs to record a number of free Livestream webcam shows. Which if you break it down equates to the following: 23.4 years worth of HD porn, 102 years worth of porn at 720p, or a whopping 3 centuries worth (293 years) at 480p.

Beaston02 has stopped his recording adventures but has released how he did it, and the torch has been passed on to another group of diligent porn archivists - if we are going to let that become a title - who have collectively embarked on the Petabyte Porn Project, which has the similar goal of recording and storing recorded porn on Amazon and Google Drive. The Petabyte Porn Project allegedly stockpiles 12 terabytes a day.

Earlier this month the plans for the largest data storage centre that will be built in the Arctic Circle in Norway was reported on, back then some naysayers questioned what could possibly demand such a huge secure facility, it seems that question has been answered.

Go here to see the original:
Nearly 300 years worth of porn was recorded to test Amazon's ... - Neowin

Read More..

pCloud First Cloud Storage Provider to Offer Lifetime Plan | 08/29/17 … – Markets Insider

BAAR, Switzerland, Aug. 29, 2017 /PRNewswire/ --

What is pCloud?

pCloud is a personal cloud space where files and folders can be stored. It has a user-friendly interface that clearly shows where everything is located and what it does. The software is available for almost any devices and platforms iOS and Android devices, Mac, Windows, and Linux. By installing pCloud on the computer (through its desktop application pCloud Drive), the app creates a secure virtual drive which expands local storage space. Every change made in a pCloud account can be seen immediately on all other devices - computer, phone or tablet. All devices are instantly synchronized and have direct file access to any update. And if that's not enough, pCloud offers a new, industry-first LIFETIME PLAN so everyone will have unlimited, secure storage space forever.

How is pCloud unique from other cloud storage services?

The main difference is that pCloud does not take space on the computer. pCloud Drive acts as a virtual hard disk drive, which allows users to access and work with content in the cloud, without using any local space.

What is significant about the lifetime plan?

The introduction of the Lifetime plan is something that no other company in the cloud storage market has done before. It gives users the chance to invest in a secure storage solution and eliminate the risk of losing their files to external drives, which have an average lifespan of around 5 years.

External hard-drives are in imperfect solution as they cost hundreds of dollars and have a 20% chance of breaking down in the first year, not to mention the risk of being stolen. The cost of recovering information on an external hard drive is extremely high, and can often exceed $1,000.

Over a long period, the cost of other cloud storage services is exorbitant and prohibitive.

How much does pCloud lifetime storage cost?

With pCloud, there are no monthly or yearly payments. For one payment users get storage for a lifetime.

About pCloud

pCloud was launched just over 3 years ago and has grown into a community of more than 7 million users from around the world. Today, the service is among the top five players in the global cloud storage market. In 2015 the company received a round A series of investments amounting to $3 million for the expansion of the service in the international scene. pCloud has over 1.4 billion uploaded files and over eight PetaBytes of maintained information.

Media Contact:Tunio ZaferCEO rel="nofollow">172930@email4pr.com+41 43 508 59 48

View original content with multimedia:http://www.prnewswire.com/news-releases/pcloud-first-cloud-storage-provider-to-offer-lifetime-plan-300510271.html

SOURCE pCloud

Read more here:
pCloud First Cloud Storage Provider to Offer Lifetime Plan | 08/29/17 ... - Markets Insider

Read More..

Internet Explorer – Wikipedia

Internet ExplorerOriginal author(s)Thomas ReardonDeveloper(s)MicrosoftInitial releaseAugust16, 1995; 22 years ago(1995-08-16)Last release(s)Windows11.0.45 (11.0.9600.10586.0) (August8, 2017; 21 days ago(2017-08-08)) [][1]Mac5.2.3 (June16, 2003; 14 years ago(2003-06-16)) []Unix5.01 SP1 (2001; 16years ago(2001)) []Development statusDiscontinued but still maintained[2]Written inC++[3]Operating systemWindows, Mac OS X, Solaris, HP-UXIncluded withWindows 95 OSR1 and laterWindows NT 4 and laterMac OS 8.1 through Mac OS X 10.2Xbox 360Xbox OneEnginesTrident, ChakraPlatformIA-32, x64, ARMv7, IA-64, MIPS, Alpha, PowerPC, 68k, SPARC, PA-RISCAvailable in95 languages[4]TypeWeb browserFeed readerLicenseProprietary, requires a Windows license[5]Websitemicrosoft.com/ieStandard(s)HTML5, CSS3, WOFF, SVG, RSS, Atom, JPEG XRInternet Explorer versions:

Internet Explorer[a] (formerly Microsoft Internet Explorer[b] and Windows Internet Explorer,[c] commonly abbreviated IE or MSIE) is a series of graphical web browsers developed by Microsoft and included in the Microsoft Windows line of operating systems, starting in 1995. It was first released as part of the add-on package Plus! for Windows 95 that year. Later versions were available as free downloads, or in service packs, and included in the original equipment manufacturer (OEM) service releases of Windows 95 and later versions of Windows. The browser is discontinued, but still maintained.[2]

Internet Explorer was one of the most widely used web browsers, attaining a peak of about 95% usage share during 2002 and 2003.[6] This came after Microsoft used bundling to win the first browser war against Netscape, which was the dominant browser in the 1990s. Its usage share has since declined with the launch of Firefox (2004) and Google Chrome (2008), and with the growing popularity of operating systems such as macOS, Linux, iOS and Android that do not run Internet Explorer. Estimates for Internet Explorer's overall market share range from 3.91% to 16.84% or by StatCounter's numbers ranked 3rd, just after Firefox (or even as low as 5th when counting all platforms[7]), as of June 2017[update] (browser market share is notoriously difficult to calculate). Microsoft spent over US$100 million per year on Internet Explorer in the late 1990s,[8] with over 1,000 people working on it by 1999.[9][10]

Versions of Internet Explorer for other operating systems have also been produced, including an Xbox 360 version called Internet Explorer for Xbox and for platforms Microsoft no longer supports: Internet Explorer for Mac and Internet Explorer for UNIX (Solaris and HP-UX), and an embedded OEM version called Pocket Internet Explorer, later rebranded Internet Explorer Mobile made for Windows Phone, Windows CE, and previously, based on Internet Explorer 7 for Windows Mobile.

On March 17, 2015, Microsoft announced that Microsoft Edge would replace Internet Explorer as the default browser on its Windows 10 devices. This effectively makes Internet Explorer 11 the last release. Internet Explorer, however, remains on Windows 10 primarily for enterprise purposes.[11] Starting January 12, 2016, only Internet Explorer 11 is supported.[12][13] Support varies based on the operating system's technical capabilities and its support lifecycle.[14]

The browser has been scrutinized throughout its development for use of third-party technology (such as the source code of Spyglass Mosaic, used without royalty in early versions) and security and privacy vulnerabilities, and the United States and the European Union have alleged that integration of Internet Explorer with Windows has been to the detriment of fair browser competition.

The Internet Explorer project was started in the summer of 1994 by Thomas Reardon, who, according to the Massachusetts Institute of Technology Review of 2003,[15] used source code from Spyglass, Inc. Mosaic, which was an early commercial web browser with formal ties to the pioneering National Center for Supercomputing Applications (NCSA) Mosaic browser.[16][17] In late 1994, Microsoft licensed Spyglass Mosaic for a quarterly fee plus a percentage of Microsoft's non-Windows revenues for the software.[17] Although bearing a name similar to NCSA Mosaic, Spyglass Mosaic had used the NCSA Mosaic source code sparingly.[18] Microsoft was sued by Synet Inc. in 1996, over the trademark infringement.[19]

The first version of Internet Explorer, Microsoft Internet Explorer (later referred to as Internet Explorer 1) made its debut on August 16, 1995. It was a reworked version of Spyglass Mosaic, which Microsoft licensed from Spyglass Inc., like many other companies initiating browser development.[16][17] It was installed as part of the Internet Jumpstart Kit in Microsoft Plus! for Windows 95 and Plus!.[20] The Internet Explorer team began with about six people in early development.[18][21] Internet Explorer 1.5 was released several months later for Windows NT and added support for basic table rendering. By including it free of charge on their operating system, they did not have to pay royalties to Spyglass Inc, resulting in a lawsuit and a US$8 million settlement on January 22, 1997.[16][22]

Internet Explorer 9 was released on March 14, 2011.[23] Development for Internet Explorer 9 began shortly after the release of Internet Explorer 8.[24] Microsoft first announced Internet Explorer 9 at PDC 2009, and spoke mainly about how it takes advantage of hardware acceleration in DirectX to improve the performance of web applications and quality of web typography. At MIX 10, Microsoft showed and publicly released the first Platform Preview for Internet Explorer 9, a frame for IE9's engine not containing any UI of the browser. Leading up to the release of the final browser, Microsoft released updated platform previews, each featuring improved JavaScript compiling (32-bit version), improved scores on the Acid3 test, as well as additional HTML5 standards support, approximately every 6 weeks. Ultimately, eight platform previews were released. The first public beta was released at a special event in San Francisco, which was themed around "the beauty of the web". The release candidate was released on February 10, 2011, and featured improved performance, refinements to the UI, and further standards support. The final version was released during the South by Southwest (SXSW) Interactive conference in Austin, Texas, on March 14, 2011.[23]

Internet Explorer 9 is only supported on Windows 7, Windows Server 2008, and Windows Server 2008 R2,[25] and was supported on Windows Vista SP2. It supports several CSS 3 properties (including border-radius, box-shadow, etc.), and embedded ICC v2 or v4 colour profiles support via Windows Color System. The 32-bit version has faster JavaScript performance, this being due to a new JavaScript engine called "Chakra".[26] It also features hardware accelerated graphics rendering using Direct2D, hardware-accelerated text rendering using DirectWrite, hardware-accelerated video rendering using Media Foundation, imaging support provided by Windows Imaging Component, and high fidelity printing powered by the XPS print pipeline.[27] IE9 also supports the HTML5 video and audio tags and the Web Open Font Format.[28] Internet Explorer 9 initially scored 95/100 on the Acid3 test, but has scored 100/100 since the test was updated in September 2011.[29]

Internet Explorer was to be omitted from Windows 7 and Windows Server 2008 R2 in Europe, but Microsoft ultimately included it, with a browser option screen allowing users to select any of several web browsers (including Internet Explorer).[30][31][32][33][34]

Internet Explorer is now available on Xbox 360 with Kinect support, as of October 2012.[35]

Internet Explorer 10 became generally available on October 26, 2012, alongside Windows 8 and Windows Server 2012, but is by now supported on Windows Server 2012, while Windows Server 2012 R2 only supports Internet Explorer 11. It became available for Windows 7 on February 26, 2013.[36] Microsoft announced Internet Explorer 10 in April 2011, at MIX 11 in Las Vegas, releasing the first Platform Preview at the same time. At the show, it was said that Internet Explorer 10 was about 3 weeks in development.[37] This release further improves upon standards support, including HTML5 Drag & Drop and CSS3 gradients. Internet Explorer 10 drops support for Windows Vista and will only run on Windows 7 Service Pack 1 and later.[38] Internet Explorer 10 Release Preview was also released on the Windows 8 Release Preview platform.

Internet Explorer 11 is featured in a Windows 8.1 update which was released on October 17, 2013. It includes an incomplete mechanism for syncing tabs. It is a major update to its developer tools,[39][40] enhanced scaling for high DPI screens,[41]HTML5 prerender and prefetch,[42]hardware-accelerated JPEG decoding,[43]closed captioning, HTML5 full screen,[44] and is the first Internet Explorer to support WebGL[45][46][47] and Google's protocol SPDY (starting at v3).[48] This version of IE has features dedicated to Windows 8.1, including cryptography (WebCrypto),[39]adaptive bitrate streaming (Media Source Extensions)[49] and Encrypted Media Extensions.[44]

Internet Explorer 11 was made available for Windows 7 users to download on November 7, 2013, with Automatic Updates in the following weeks.[50]

Internet Explorer 11's user agent string now identifies the agent as "Trident" (the underlying layout engine) instead of "MSIE". It also announces compatibility with Gecko (the layout engine of Firefox).

Microsoft claimed that Internet Explorer 11, running the WebKit SunSpider JavaScript Benchmark, was the fastest browser as of October 15, 2013.[51]

Microsoft Edge, officially unveiled on January 21, 2015, has replaced Internet Explorer as the default browser on Windows 10. Internet Explorer is still installed in Windows 10 in order to maintain compatibility with older websites and intranet sites that require ActiveX and other Microsoft legacy web technologies.[52][53][54]

According to Microsoft, development of new features for Internet Explorer has ceased. However, it will continue to be maintained as part of the support policy for the versions of Windows with which it is included.[2]

Internet Explorer has been designed to view a broad range of web pages and provide certain features within the operating system, including Microsoft Update. During the heyday of the browser wars, Internet Explorer superseded Netscape only when it caught up technologically to support the progressive features of the time.[55][bettersourceneeded]

Internet Explorer, using the Trident layout engine:

Internet Explorer uses DOCTYPE sniffing to choose between standards mode and a "quirks mode" in which it deliberately mimicks nonstandard behaviours of old versions of MSIE for HTML and CSS rendering on screen (Internet Explorer always uses standards mode for printing). It also provides its own dialect of ECMAScript called JScript.

Internet Explorer was criticised by Tim Berners-Lee for its limited support for SVG which is promoted by W3C.[59]

Internet Explorer has introduced an array of proprietary extensions to many of the standards, including HTML, CSS, and the DOM. This has resulted in a number of web pages that appear broken in standards-compliant web browsers and has introduced the need for a "quirks mode" to allow for rendering improper elements meant for Internet Explorer in these other browsers.

Internet Explorer has introduced a number of extensions to the DOM that have been adopted by other browsers. These include the innerHTML property, which provides access to the HTML string within an element[citation needed]; the XMLHttpRequest object, which allows the sending of HTTP request and receiving of HTTP response, and may be used to perform AJAX; and the designMode attribute of the contentDocument object, which enables rich text editing of HTML documents[citation needed] . Some of these functionalities were not possible until the introduction of the W3C DOM methods. Its Ruby character extension to HTML is also accepted as a module in W3C XHTML 1.1, though it is not found in all versions of W3C HTML.

Microsoft submitted several other features of IE for consideration by the W3C for standardization. These include the 'behaviour' CSS property, which connects the HTML elements with JScript behaviours (known as HTML Components, HTC); HTML+TIME profile, which adds timing and media synchronization support to HTML documents (similar to the W3C XHTML+SMIL), and the VML vector graphics file format. However, all were rejected, at least in their original forms; VML was subsequently combined with PGML (proposed by Adobe and Sun), resulting in the W3C-approved SVG format, one of the few vector image formats being used on the web, which IE did not support until version 9.[60]

Other non-standard behaviours include: support for vertical text, but in a syntax different from W3C CSS3 candidate recommendation, support for a variety of image effects[61] and page transitions, which are not found in W3C CSS, support for obfuscated script code, in particular JScript.Encode.[62] Support for embedding EOT fonts in web pages.[63]

Support for favicons was first added in Internet Explorer 5.[64] Internet Explorer supports favicons in PNG, static GIF and native Windows icon formats. In Windows Vista and later, Internet Explorer can display native Windows icons that have embedded PNG files.[65][66]

Internet Explorer makes use of the accessibility framework provided in Windows. Internet Explorer is also a user interface for FTP, with operations similar to that of Windows Explorer. Pop-up blocking and tabbed browsing were added respectively in Internet Explorer 6 and Internet Explorer 7. Tabbed browsing can also be added to older versions by installing MSN Search Toolbar or Yahoo Toolbar.

Internet Explorer caches visited content in the Temporary Internet Files folder to allow quicker access (or offline access) to previously visited pages. The content is indexed in a database file, known as Index.dat. Multiple Index.dat files exist which index different contentvisited content, web feeds, visited URLs, cookies, etc.[67]

Prior to IE7, clearing the cache used to clear the index but the files themselves were not reliably removed, posing a potential security and privacy risk. In IE7 and later, when the cache is cleared, the cache files are more reliably removed, and the index.dat file is overwritten with null bytes.

Caching has been improved in IE9.[68]

Internet Explorer is fully configurable using Group Policy. Administrators of Windows Server domains (for domain-joined computers) or the local computer can apply and enforce a variety of settings on computers that affect the user interface (such as disabling menu items and individual configuration options), as well as underlying security features such as downloading of files, zone configuration, per-site settings, ActiveX control behaviour and others. Policy settings can be configured for each user and for each machine. Internet Explorer also supports Integrated Windows Authentication.

Internet Explorer uses a componentized architecture built on the Component Object Model (COM) technology. It consists of several major components, each of which is contained in a separate Dynamic-link library (DLL) and exposes a set of COM programming interfaces hosted by the Internet Explorer main executable, iexplore.exe:[69]

Internet Explorer does not include any native scripting functionality. Rather, MSHTML.dll exposes an API that permits a programmer to develop a scripting environment to be plugged-in and to access the DOM tree. Internet Explorer 8 includes the bindings for the Active Scripting engine, which is a part of Microsoft Windows and allows any language implemented as an Active Scripting module to be used for client-side scripting. By default, only the JScript and VBScript modules are provided; third party implementations like ScreamingMonkey (for ECMAScript 4 support) can also be used. Microsoft also makes available the Microsoft Silverlight runtime (not supported in Windows RT) that allows CLI languages, including DLR-based dynamic languages like IronPython and IronRuby, to be used for client-side scripting.

Internet Explorer 8 introduces some major architectural changes, called Loosely Coupled IE (LCIE). LCIE separates the main window process (frame process) from the processes hosting the different web applications in different tabs (tab processes). A frame process can create multiple tab processes, each of which can be of a different integrity level; each tab process can host multiple web sites. The processes use asynchronous Inter-Process Communication to synchronize themselves. Generally, there will be a single frame process for all web sites. In Windows Vista with Protected Mode turned on, however, opening privileged content (such as local HTML pages) will create a new tab process as it will not be constrained by Protected Mode.[71]

Internet Explorer exposes a set of Component Object Model (COM) interfaces that allows add-ons to extend the functionality of the browser.[69] Extensibility is divided into two types: Browser extensibility and content extensibility. Browser extensibility involves adding context menu entries, toolbars, menu items or Browser Helper Objects (BHO). BHOs are used to extend the feature set of the browser, whereas the other extensibility options are used to expose that feature in the user interface. Content extensibility adds support for non-native content formats.[69] It allows Internet Explorer to handle new file formats and new protocols, e.g. WebM or SPDY.[69] In addition, web pages can integrate widgets known as ActiveX controls which run on Windows only but have vast potentials to extend the content capabilities; Adobe Flash Player and Microsoft Silverlight are examples.[69] Add-ons can be installed either locally, or directly by a web site.

Since malicious add-ons can compromise the security of a system, Internet Explorer implements several safeguards. Internet Explorer 6 with Service Pack 2 and later feature an Add-on Manager for enabling or disabling individual add-ons, complemented by a "No Add-Ons" mode. Starting with Windows Vista, Internet Explorer and its BHOs run with restricted privileges and are isolated from the rest of the system. Internet Explorer 9 introduced a new component Add-on Performance Advisor. Add-on Performance Advisor shows a notification when one or more of installed add-ons exceed a pre-set performance threshold. The notification appears in the Notification Bar when the user launches the browser. Windows 8 and Windows RT introduce a Metro-style version of Internet Explorer that is entirely sandboxed and does not run add-ons at all.[72] In addition, Windows RT cannot download or install ActiveX controls at all; although existing ones bundled with Windows RT still run in the traditional version of Internet Explorer.[72]

Internet Explorer itself can be hosted by other applications via a set of COM interfaces. This can be used to embed the browser functionality inside a computer program or create Internet Explorer shells.[69]

Internet Explorer uses a zone-based security framework that groups sites based on certain conditions, including whether it is an Internet- or intranet-based site as well as a user-editable whitelist. Security restrictions are applied per zone; all the sites in a zone are subject to the restrictions.

Internet Explorer 6 SP2 onwards uses the Attachment Execution Service of Microsoft Windows to mark executable files downloaded from the Internet as being potentially unsafe. Accessing files marked as such will prompt the user to make an explicit trust decision to execute the file, as executables originating from the Internet can be potentially unsafe. This helps in preventing accidental installation of malware.

Internet Explorer 7 introduced the phishing filter, that restricts access to phishing sites unless the user overrides the decision. With version 8, it also blocks access to sites known to host malware. Downloads are also checked to see if they are known to be malware-infected.

In Windows Vista, Internet Explorer by default runs in what is called Protected Mode, where the privileges of the browser itself are severely restrictedit cannot make any system-wide changes. One can optionally turn this mode off but this is not recommended. This also effectively restricts the privileges of any add-ons. As a result, even if the browser or any add-on is compromised, the damage the security breach can cause is limited.

Patches and updates to the browser are released periodically and made available through the Windows Update service, as well as through Automatic Updates. Although security patches continue to be released for a range of platforms, most feature additions and security infrastructure improvements are only made available on operating systems which are in Microsoft's mainstream support phase.

On December 16, 2008, Trend Micro recommended users switch to rival browsers until an emergency IE patch was released to fix a potential security risk which "could allow outside users to take control of a person's computer and steal their passwords". Microsoft representatives countered this recommendation, claiming that "0.02% of internet sites" were affected by the flaw.

On December 17, 2008, a fix to the security problem above became available, with the release of the Security Update for Internet Explorer KB960714, which is available from Microsoft Windows Update's webpage. Microsoft has said that this update fixes the security risk found by Trend Micro the previous day.[73][74]

In 2011, a report by Accuvant, funded by Google, rated the security (based on sandboxing) of Internet Explorer worse than Google Chrome but better than Mozilla Firefox.[75][76]

Internet Explorer has been subjected to many security vulnerabilities and concerns: much of the spyware, adware, and computer viruses across the Internet are made possible by exploitable bugs and flaws in the security architecture of Internet Explorer, sometimes requiring nothing more than viewing of a malicious web page in order to install themselves. This is known as a "drive-by install". There are also attempts to trick the user into installing malicious software by misrepresenting the software's true purpose in the description section of an ActiveX security alert.

A number of security flaws affecting IE originated not in the browser itself, but ActiveX-based add-ons used by it. Because the add-ons have the same privilege as IE, the flaws can be as critical as browser flaws. This has led to the ActiveX-based architecture being criticized for being fault-prone. By 2005, some experts maintained that the dangers of ActiveX have been overstated and there were safeguards in place.[77] In 2006, new techniques using automated testing found more than a hundred vulnerabilities in standard Microsoft ActiveX components.[78] Security features introduced in Internet Explorer 7 mitigated some of these vulnerabilities.

Internet Explorer in 2008, had a number of published security vulnerabilities. According to research done by security research firm Secunia, Microsoft did not respond as quickly as its competitors in fixing security holes and making patches available.[79] The firm also reported 366 vulnerabilities in ActiveX controls, an increase from the prior year.

According to an October 2010 report in The Register, researcher Chris Evans had detected a known security vulnerability which, then dating back to 2008, had not been fixed for at least 600 days.[80] Microsoft says that it had known about this vulnerability but it was of very low severity as the victim web site must be configured in a special way for this attack to be feasible at all.[81]

In December 2010, researchers were able to bypass the "Protected Mode" feature in Internet Explorer.[82]

No info

In an advisory on January 14, 2010, Microsoft said that attackers targeting Google and other U.S. companies used software that exploits a security hole, which had already been patched, in Internet Explorer. The vulnerability affected Internet Explorer 6 on Windows XP and Server 2003, IE6 SP1 on Windows 2000 SP4, IE7 on Windows Vista, XP, Server 2008 and Server 2003, and IE8 on Windows 7, Vista, XP, Server 2003, and Server 2008 (R2).[84]

The German government warned users against using Internet Explorer and recommended switching to an alternative web browser, due to the major security hole described above that was exploited in Internet Explorer.[85] The Australian and French Government issued a similar warning a few days later.[86][87][88][89]

On April 26, 2014, Microsoft issued a security advisory relating to CVE-2014-1776 (use-after-free vulnerability in Microsoft Internet Explorer 6 through 11[90]), a vulnerability that could allow "remote code execution" in Internet Explorer versions 6 to 11.[91] On April 28, 2014, the United States Department of Homeland Security's United States Computer Emergency Readiness Team (US-CERT) released an advisory stating that the vulnerability could result in "the complete compromise" of an affected system.[92] US-CERT recommended reviewing Microsoft's suggestions to mitigate an attack or using an alternate browser until the bug is fixed.[93][94] The UK National Computer Emergency Response Team (CERT-UK) published an advisory announcing similar concerns and for users to take the additional step of ensuring their antivirus software is up-to-date.[95]Symantec, a cyber security firm, confirmed that "the vulnerability crashes Internet Explorer on Windows XP".[96] The vulnerability was resolved on May 1, 2014, with a security update.[97]

The adoption rate of Internet Explorer seems to be closely related to that of Microsoft Windows, as it is the default web browser that comes with Windows. Since the integration of Internet Explorer 2.0 with Windows 95 OSR 1 in 1996, and especially after version 4.0's release in 1997, the adoption was greatly accelerated: from below 20% in 1996, to about 40% in 1998, and over 80% in 2000. This made Microsoft the winner in the infamous 'first browser war' against Netscape. Netscape Navigator was the dominant browser during 1995 and until 1997, but rapidly lost share to IE starting in 1998, and eventually slipped behind in 1999. The integration of IE with Windows led to a lawsuit by AOL, Netscape's owner, accusing Microsoft of unfair competition. The infamous case was eventually won by AOL but by then it was too late, as Internet Explorer had already become the dominant browser.

Internet Explorer peaked during 2002 and 2003, with about 95% share. Its first notable competitor after beating Netscape was Firefox from Mozilla, which itself was an offshoot from Netscape.

Firefox 1.0 had surpassed Internet Explorer 5 in early 2005, with Firefox 1.0 at roughly 8 percent market share.[98]

Approximate usage over time based on various usage share counters averaged for the year overall, or for the fourth quarter, or for the last month in the year depending on availability of reference.[99][100][101][102][103][104]

According to StatCounter Internet Explorer's marketshare fell below 50% in September 2010.[105] In May 2012, it was announced that Google Chrome overtook Internet Explorer as the most used browser worldwide.

Browser Helper Objects are also used by many search engine companies and third parties for creating add-ons that access their services, such as search engine toolbars. Because of the use of COM, it is possible to embed web-browsing functionality in third-party applications. Hence, there are a number of Internet Explorer shells, and a number of content-centric applications like RealPlayer also use Internet Explorer's web browsing module for viewing web pages within the applications.

While a major upgrade of Internet Explorer can be uninstalled in a traditional way if the user has saved the original application files for installation, the matter of uninstalling the version of the browser that has shipped with an operating system remains a controversial one.

The idea of removing a stock install of Internet Explorer from a Windows system was proposed during the United States v. Microsoft Corp. case. One of Microsoft's arguments during the trial was that removing Internet Explorer from Windows may result in system instability. Indeed, programs that depend on libraries installed by IE, including Windows help and support system, fail to function without IE. Before Windows Vista, it was not possible to run Windows Update without IE because the service used ActiveX technology, which no other web browser supports.

The popularity of Internet Explorer has led to the appearance of malware abusing its name. On January 28, 2011, a fake Internet Explorer browser calling itself "Internet Explorer Emergency Mode" appeared. It closely resembles the real Internet Explorer, but has fewer buttons and no search bar. If a user launches any other browser such as Google Chrome, Mozilla Firefox, Opera, Safari or the real Internet Explorer, this browser will pop-up instead. It also displays a fake error message, claiming that the computer is infected with malware and Internet Explorer has entered Emergency Mode. It blocks access to legitimate sites such as Google if infected users try to access them.[106][107]

Read this article:
Internet Explorer - Wikipedia

Read More..

Your essential guide to internet security – IT PRO

The internet is a fickle beast. On the one hand, we now have access to the sum total of human knowledge (and human opinion) at our fingertips across an incredible range of devices. On the other, it's opened us up to a whole new world of crime, where scammers are waiting seemingly around every corner.

But just because a threat is out there, doesn't mean you must inevitably be vulnerable to it.

Here are some simple steps to ensure both you and your business remain safe on the internet.

Running internet security software on your endpoints (computers, mobile devices, tablets, etc) is the simplest place to start.

Most of the well known antivirus firms, have dedicated internet security products for both individuals and SMBs. They include features such as warning you if a page isn't secure, which is particularly important if you're going to be entering sensitive personal data, or if a page is trying to redirect you, as well as protection against malware downloads, including ransomware.

This type of software should ideally be used in conjunction with other on-device anti-malware programs.

When it comes to internet security, the proverb "better safe than sorry" is very much applicable. Genuine looking messages can be laden with hidden traps, like documents or PDFs containing malicious payloads or links to infected websites a technique commonly known as phishing.

If you receive an email from the finance department asking to "double check this invoice", for example, don't be afraid to reply asking for more details about the invoice before you open the attachment. Even better, if you use an instant message platform, such as Skype for Business, Slack or Yammer in your company, contact the sender directly there to double check.

Similarly, if the email comes from a supplier or customer and includes an attachment or link, it's better to call them up for clarification or details than to blindly click the link out of a sense of typical British "don't make a fuss" sentiment.

Be warned that scammers may also target you by phone. Remember that your bank will never make an unsolicited call and ask for your security details - if in doubt, hang up and call back. If the call is from "Microsoft support", hang up immediately.

Any of these types of attempted scam should be reported to the IT department as soon as possible.

Education is a key component of the internet security process for businesses. The IT department should be keeping users up to date with the latest policies and best practices and encouraging individuals to come forward with any questions or concerns.

You can see if these messages are sinking in by bringing in companies that specialise in penetration testing and running phishing drills, for example. This can help identify areas of weakness that need to be addressed.

Finally, make sure you keep yourself up to date with the latest security news and best practices from reliable sources.

Main image credit: Bigstock

Originally posted here:
Your essential guide to internet security - IT PRO

Read More..