#iapp job board connects employers and certified #privacy professionals (#privacypros) worldwide. A region, country and certification filter would be nice. https://t.co/88jsmWORxX
22 Aug 2019
#KNOB The vulnerability (CVE-2019-9506) resides in the way devices choose an entropy value for encryption keys while establishing a connection: attacker in close proximity to the victim’s device could intercept or manipulate encrypted #Bluetooth traffic between two paired devices https://t.co/GyC0eL5fFW
21 Aug 2019
The Irish Data Protection Commission launched an investigation into the Department of Employment Affairs and Social Protection last year after it discovered a senior official changed an online declaration that said it collected biometric data. #GDPR #DPO #fg https://t.co/oE1afQAIYj
18 Aug 2019
Want more #effective #meetings? Learn these 3 rules from #Microsoft's #CEO Satya Nadella: 1. Listen more. 2. Talk less. 3. Be decisive when the time comes. Read more details: https://t.co/G2IeLuJtEG
17 Aug 2019
Dutch police #politie helped 300 Dutch #GandCrab-#ransomware victims deciphering their files. They would otherwise have to pay $600 each to the criminals to (probably) get their files back. See the police website: https://t.co/6BidHY9Gr8 or Dutch news: https://t.co/bgLRUdfHGz
15 Aug 2019
Free "Batch Icon Extractor"Get all the Icons out of applications. This easy to use application by RealWorld Graphics creates icon files for every icon in a Windows application. This free program can be a great help to create icons for your Citrix XenApp / XenDesktop environments.
How to use "Batch Icon Extractor"?
Example how the program works on the rw-designer site.
You may vote your opinion about this article:
Scripts and programming examples disclaimerUnless stated otherwise, the script sources and programming examples provided are copyrighted freeware. You may modify them, as long as a reference to the original code and hyperlink to the source page is included in the modified code and documentation. However, it is not allowed to publish (copies of) scripts and programming examples on your own site, blog, vlog, or distribute them on paper or any other medium, without prior written consent.
Many of the techniques used in these scripts, including but not limited to modifying the registry or system files and settings, impose a risk of rendering the Operating System inoperable and loss of data. Make sure you have verified full backups and the associated restore software available before running any script or programming example. Use these scripts and programming examples entirely at your own risk. All liability claims against the author in relation to material or non-material losses caused by the use, misuse or non-use of the information provided, or the use of incorrect or incomplete information, are excluded. All content is subject to change and provided without obligation.
Generated by WebHalla™ Version 0.1.e.3 : Sunday 25-8-2019
© Copyright 1995-2019 Johan van Soest