15 Results for:VLC

  • Sort by: 

Chinese Silkloader cyber attack tool falls into Russian hands

By Alex Scroxton 15 Mar 2023

A loader tool used by Chinese cyber criminals seems to have been enthusiastically taken up in recent weeks by Russian ransomware operators Read More

Manage Windows 10 default file type associations with SetUserFTA

By Dan Franciscus 20 Dec 2019

Windows 10 default file type associations dictate which applications open for different file types. Find out how IT can manage these associations with the SetUserFTA tool. Read More

Open core vs. open source: What's the difference?

By Stephen J. Bigelow 29 Sep 2022

Open core software has gained attention as an alternative to open source and proprietary models. Learn how open core differs from open source and the two approaches' pros and cons. Read More

How to create a custom ISO for Windows 10

By Kari Finn 05 May 2022

A custom ISO for Windows 10 can make desktop deployment and installation much simpler. IT allows admins to including applications and themes pre-installed on business desktops. Read More

Combine Puppet and Chocolatey to drive Windows DevOps

By Dan Franciscus 19 Jul 2019

Through the use of Puppet and Chocolatey side by side, Windows IT professionals can use Linux-like DevOps tools to automate the deployment and configuration of their systems. Read More

Bug Briefs: OpenOffice vulnerable to attack

07 Jan 2007

Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server. Read More

EU patches 20-year-old open source vulnerability

By Alex Scroxton 04 Nov 2019

Ethical hackers taking part in a bug bounty programme on behalf of the European Union have uncovered a 20-year-old vulnerability Read More

How to create Windows 10 toast notifications with PowerShell

By Dan Franciscus 26 Mar 2019

IT can send pop-up notifications to a Windows 10 user's taskbar with a PowerShell module called BurntToast. Here's how to get started creating toast notifications. Read More

How can hackers use subtitle files to control endpoint devices?

By Judith Myerson 12 Oct 2017

New media player vulnerabilities have been exposed that enable hackers to use subtitle files to control devices. Expert Judith Myerson explains how this happens. Read More

Tune Into PortableApps.com

By Ed Tittel 30 Apr 2018

If you tune into PortableApps.com and use their platform, you'll find a great way to take tools, utilities and applications with you onto any PC. Great stuff! Read More