Skip to main content

Some IT Staffers Sneak a Peak

In a survey of 300 Senior IT professionals conducted at Infosecurity Expo 2008, one third of respondents admitted to using their privileged rights to access confidential or sensitive information, and 47 percent said that they had accessed information that was not relevant to their job role. 30 percent said that the privileged passwords in their organizations get changed every quarter, while 9 percent said that privileged passwords never get changed.

Source: Cyber-Ark


Popular posts from this blog

JD Edwards 9.1 Standalone Installation Tutorial

Hello and welcome to! Here's a video tutorial on how to install the newest JD Edwards 9.1 version! In only six steps and no magic, you will have your JD Edwards up and running, including the Web version! The JD Edwards team did an outstanding job on this new version and I'm proud to be the first to document in video the installation steps and show you the system working after the installation. The tutorial is divided in the following steps: Images download - E-Delivery Directory preparation Oracle 11g 32 bit installation JDE Demo installation Post installation procedures System check By following the video you'll be able to have your own JD Edwards' instance running directly in your PC or you may also install as a Virtual Machine using Oracle Virtual Box. The base OS I'm using for this tutorial is Linux and as you can see, the Virtual Box VM works fast and is also stable. Please let me know if you need some information on how to se

Tools Release