an Wireshark Analyzer 2.4.5 By packetstormsecurity.com Published On :: Mon, 26 Feb 2018 16:42:25 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.4.6 By packetstormsecurity.com Published On :: Tue, 03 Apr 2018 23:03:33 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.0 By packetstormsecurity.com Published On :: Wed, 25 Apr 2018 00:56:47 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.1 By packetstormsecurity.com Published On :: Wed, 23 May 2018 07:18:41 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.2 By packetstormsecurity.com Published On :: Thu, 19 Jul 2018 01:55:38 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.3 By packetstormsecurity.com Published On :: Fri, 31 Aug 2018 00:54:53 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.4 By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 00:48:56 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Htcap Analysis Tool 1.1.0 By packetstormsecurity.com Published On :: Wed, 28 Nov 2018 18:01:38 GMT Htcap is a web application analysis tool for detecting communications between javascript and the server. It crawls the target application and maps ajax calls, dynamically inserted scripts, websockets calls, dynamically loaded resources and some interesting elements. The generated report is meant to be a good starting point for a manual web application security audit. Htcap is written in python and uses phantomjs to load pages injecting a probe that analyzes javascript behaviour. Once injected, the probe, overrides native javascript methods in order to intercept communications and DOM changes. It also simulates user interaction by firing all attached events and by filling html inputs. Full Article
an Wireshark Analyzer 2.6.5 By packetstormsecurity.com Published On :: Thu, 29 Nov 2018 02:32:44 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.6 By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 22:52:39 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 2.6.7 By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 02:46:43 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.0 By packetstormsecurity.com Published On :: Thu, 28 Feb 2019 21:42:50 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.1 By packetstormsecurity.com Published On :: Tue, 09 Apr 2019 18:15:14 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.2 By packetstormsecurity.com Published On :: Thu, 23 May 2019 16:41:32 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.3 By packetstormsecurity.com Published On :: Thu, 18 Jul 2019 19:03:58 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.4 By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:40:35 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.5 By packetstormsecurity.com Published On :: Fri, 20 Sep 2019 22:18:32 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.6 By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:16:50 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.0.7 By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 23:38:08 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.2.0 By packetstormsecurity.com Published On :: Wed, 18 Dec 2019 22:32:09 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.2.1 By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:48:51 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.2.2 By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:27:45 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Wireshark Analyzer 3.2.3 By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 15:00:54 GMT Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers. Full Article
an Iran Claims To Have Thwarted A US Cyber Espionage Operation By packetstormsecurity.com Published On :: Wed, 19 Jun 2019 17:09:15 GMT Full Article headline government usa cyberwar spyware iran
an U.S. Launched Cyberattacks On Iranian Intel Sites By packetstormsecurity.com Published On :: Mon, 24 Jun 2019 16:43:23 GMT Full Article headline government usa cyberwar iran
an Iran Seizes 1,000 Bitcoin Mining Machines After Power Spike By packetstormsecurity.com Published On :: Fri, 28 Jun 2019 15:12:07 GMT Full Article headline iran cryptography
an US Hack Attack Hobbles Iran's Ability To Target Oil Tankers By packetstormsecurity.com Published On :: Thu, 29 Aug 2019 15:57:21 GMT Full Article headline hacker government usa cyberwar iran military
an US Military Veterans Targeted By Iranian State Hackers By packetstormsecurity.com Published On :: Wed, 25 Sep 2019 16:56:49 GMT Full Article headline hacker government malware usa cyberwar iran
an Microsoft Says Iranian Hackers Tried To Hack A US Presidential Campaign By packetstormsecurity.com Published On :: Sat, 05 Oct 2019 14:22:25 GMT Full Article headline hacker government microsoft usa fraud cyberwar iran
an US Claims Cyber Strike On Iran After Attack On Saudi Oil Facility By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:44:59 GMT Full Article headline government usa cyberwar iran saudi arabia
an Russian Hackers Cloak Attacks Using Iranian Group By packetstormsecurity.com Published On :: Mon, 21 Oct 2019 16:39:23 GMT Full Article headline government malware usa russia cyberwar iran military
an Iranian Hacking Group Built Its Own VPN Network By packetstormsecurity.com Published On :: Thu, 14 Nov 2019 15:40:36 GMT Full Article headline hacker cyberwar iran cryptography
an Iran Targets Mideast Oil With ZeroCleare Wiper Malware By packetstormsecurity.com Published On :: Wed, 04 Dec 2019 23:47:11 GMT Full Article headline malware cyberwar iran
an Soleimani: US Federal Site Hacked With Pro-Iranian Message By packetstormsecurity.com Published On :: Mon, 06 Jan 2020 16:01:30 GMT Full Article headline hacker government usa cyberwar iran military
an Iran Has Already Hacked The U.S. At Least Four Times And Could Do It Again By packetstormsecurity.com Published On :: Tue, 07 Jan 2020 16:45:47 GMT Full Article headline hacker government usa cyberwar iran military
an Oil-and-Gas APT From Magnallium Pivots To U.S. Power Plants By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 15:30:52 GMT Full Article headline malware usa cyberwar iran scada
an Suspected Iranian Hackers Target European Energy Companies By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:18 GMT Full Article headline hacker government cyberwar iran scada
an Iranian Internet Attacked Saturday, Knocked Partially Offline By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:05 GMT Full Article headline government denial of service iran
an Facebook Removes Foreign Interference Operations From Iran And Russia By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:43:12 GMT Full Article headline government privacy russia data loss fraud cyberwar facebook iran
an How Many Microsoft Products Can My Nonprofit Request from TechSoup? By feeds.techsoup.org Published On :: Wed, 20 Sep 2017 23:30:00 GMT https://blog.techsoup.org/posts/how-many-microsoft-products-can-nonprofits-request Here is the short answer to the question of how many Microsoft products you can request: You can get 50 of each kind of product in a two-year period — but there are some exceptions. See Microsoft products What do you mean by "each kind of product"? The Microsoft Donation Program divides products into categories called title groups. See the current list of 37. A title group contains products that serve essentially the same purpose, like PowerPoint and PowerPoint for Mac. You can get products from 10 title groups in your two-year cycle. When does this two-year cycle start and end? Is it the calendar year? No. Your nonprofit has its own two-year cycle. Your first cycle started the day you requested your first Microsoft product through TechSoup. You can see when your current cycle ends on your Microsoft Donation Center page. Outlook and PowerPoint are both title groups. Does that mean we can get 50 of each product? That's right. They can be all the Windows version, all the Mac version, or a mixture of the two. And you will be able to request products from eight more title groups. What are the exceptions you mentioned? They have to do with servers. Microsoft offers two licensing models for its server products. Core-based licensing. This licensing is based on the number of cores in the physical processors of your server machines. The product page on TechSoup will tell you whether the server uses this type of licensing. You can request up to 50 of these products from each title group, the same as desktop products. But you might have to request more than one product to fully license all the processors in your server. Non-core-based licensing. You can request a total of five server products that do not use core-based licensing. They can be from a single title group or from different title groups, but the total cannot be more than five. A lot of the title groups are for CALs and MLs. What are the limits for these? You can get 50 from each title group. CALs, or client access licenses, give you access to a server from a device like your desktop computer. MLs, or management licenses, let your device be managed by a management server. Where can I find out more? This article goes into a lot more detail and gives examples of how the various allotments work together. spanhidden Full Article microsoft
an Nonprofit Harnesses Tech to Plant Tens of Thousands of Trees By feeds.techsoup.org Published On :: Thu, 28 Sep 2017 19:35:00 GMT (Please visit the site to view this video) What does it take to make a city greener? In San Francisco, it took a small group of motivated people to come together to create a nonprofit. After the city cut funding for urban forestry 36 years ago, seven individuals decided to take matters into their own hands. They created a nonprofit, Friends of the Urban Forest (FUF). Starting with a Small Budget, FUF Plants Nearly Half San Francisco's Street Trees The organization started off with just a small budget from a leftover city grant. Then it used grassroots efforts to rally neighborhoods throughout the city around urban trees. By empowering and supporting communities and homeowners to plant and care for their own trees, FUF has successfully planted 60,000 of the 125,000 trees in San Francisco. The group eventually even worked with the city to create San Francisco's first ever Urban Forest Plan. FUF Harnesses the Power of Many Volunteers to Plant and Advocate for Trees FUF is a member of TechSoup, and TechSoup's staffers were very excited to reach out for an interview to hear more about the group's impact. My team joined FUF early on a Saturday morning for its volunteer tree planting event in the Portola neighborhood, a part of the city that is lacking street trees. It was cold even by San Francisco standards, but there was an impressive turnout of volunteers present and ready to plant. The executive director of FUF, Dan Flanagan, joined us and told us about his work. "We get to get out in the city and make it greener. We advocate for trees; I always call ourselves the Lorax of San Francisco. We are the only organization in San Francisco that is speaking for the trees." FUF Gets the Chance to Plant Even More Trees … in Neighborhoods That Really Need Them Dan was excited about a recent accomplishment for the organization. San Francisco just passed Proposition E, which opens up major opportunities for the nonprofit. As he said, "It changes the responsibility from street trees and sidewalks away from the homeowners and to the city. As a result, homeowners are no longer responsible, and now we actually get a chance to make the city more green than ever before by planting more trees in neighborhoods that couldn't afford it before." This policy makes the city responsible for maintenance, but it will still require FUF to continue its work of planting the trees. FUF hopes to plant 1,700 trees this year and ultimately hopes to plant 3,000 trees every year. FUF Puts Technology from TechSoup to Work I was curious to find out how FUF was using technology to further its mission. Jason Boyce, individual gifts manager, said: "Here at Friends of the Urban Forest, a lot of our field staff tend to be out in the field all day; technology really needs to be out of the way to allow us to plant. So, as a result, the relationships we build with our community tend to be stronger because we use technology to enable our work, but it doesn't get in the way of our work." Jason explained, "We have been working with ArcMap for years, ... GIS software that TechSoup has provided for us. We use it to plant trees, to figure out where we are going to plant. When we do our plantings, we actually dole out the maps that our volunteers use to do the plantings, and all that comes through ArcMap. We use Adobe Acrobat to put together our tree manuals for our new tree owners and volunteer manuals. We use AutoCAD to put together the permit drawings for our sidewalk gardens. Technology plays a really important role in doing our plantings and making San Francisco more green." FUF Partners with the City to Calculate the Environmental Benefits of Trees Jason also recently worked with the city on the Urban Forest Map, which is an interactive online map that tracks every tree in San Francisco. The map helps calculate the environmental benefits the trees provide, including stormwater mitigation, air pollutants captured, and carbon dioxide removed from the atmosphere. This platform has increased the visibility of the city's urban forest. As Jason said, "We are now at the forefront of cities worldwide that are building software to manage their urban forests. … [This] really gives a lot of benefit to the people living in San Francisco." TechSoup is proud to support organizations like Friends of the Urban Forest by enabling them with the technology they need. That support gives them more time to focus on their impact, like planting trees, or to build the communities that help them thrive. spanhidden Full Article Adobe autodesk
an Symantec Donation Safeguards Computer Labs for Students By feeds.techsoup.org Published On :: Fri, 29 Sep 2017 15:30:00 GMT The Inland Empire, which encompasses 27,000 square miles in Southern California, has one of the highest rates of poverty in the U.S.'s twenty-five largest metropolitan areas. One in five people there live at the poverty level. Smooth Transition, Inc., is a nonprofit educational and vocational training organization that has been working with local at-risk populations since 2009. It aims to provide a gateway towards empowerment, educational, and employment opportunities to lead a fulfilling, prosperous, and purposeful life. Breaking Harmful Cycles Smooth Transition began working to reach at-risk teens early — before they dropped out of high school or left the foster care system. It later expanded its program to include all at-risk populations, including displaced adults, as a means to better help the community. Smooth Transition's life skills development and educational training increase levels of employability. Its mentorship helps prevent its clients from re-entering the foster and judicial system or repeating poverty and homelessness cycles. The nonprofit provides flexible and relevant programs that are accredited through the Western Association of Schools and Colleges. Its programs are directly tied to career pathways and provide students with vocational certifications at little or no cost to them. Graduates have a high completion rate as compared with other programs that serve at-risk populations. But students also come away with significant increases in their perceived self-value and a decrease in perceived barriers to success. Keeping the Computer Labs Secure In 2016, Smooth Transition served roughly 2,800 people with just four full-time staff members. Many of its programs are computer-based and require that its computer labs serve multiple uses and multiple users. One of the organization's board members manages its IT needs on a volunteer basis. He recommended Symantec's Norton Small Business, and the organization has been using it on its systems since it was founded. Symantec's donation of antivirus protection — through TechSoup — has enabled the nonprofit to safely use its computer labs and has increased the number of programs and services it can offer to its students. According to Dr. Robin Goins, president and executive director of Smooth Transition, "The donations we receive are the foundation of our success, and we cannot express enough the generational and community impact the Symantec donations provide us. Smooth Transition is an appreciative recipient of the donations we received from Symantec and we look forward to providing even more impactful community programs as a result." Goins goes on to describe how Smooth Transition's testing centers are networked, with students taking roughly 250,000 different kinds of exams. She worried that without security in the testing centers, the tests would be disrupted, causing a very serious problem. "If we have things disrupting our classes it costs us money. It also costs students the ability to complete their work. Having viruses attack us would be catastrophic for us." Goins points out that Norton Small Business also helps protect confidential information. "As a school, we're required to protect the identity of our students and a lot of their demographic information," she said. Smooth Transition will continue to work throughout the Inland Empire to provide flexible training and resources for those who don't fit the traditional education model. Though it faces many challenges in providing students with real, relevant work tools and skills, its staff is relieved, knowing that its systems and data are protected. spanhidden Full Article symantec
an Improve Your Fundraising Approach and Skills at NetSquared Meetups By feeds.techsoup.org Published On :: Mon, 02 Oct 2017 13:37:00 GMT Fall has arrived, and with it comes fundraising season. More than one-third of charitable giving happens in the last three months of the year, and the emergence of Giving Tuesday (on November 28 this year) makes the year's end even more critical for charities. Feeling overwhelmed? Your local NetSquared group is here to help with free, in-person events being held across the U.S. and the globe. Naples, Florida, is hosting a meetup on tools for effective email fundraising; Chippewa Falls, Wisconsin, is hosting a series of Giving Tuesday brainstorming sessions; and Chicago, Illinois, will explore how your CRM can save end-of-year fundraising plans. With more than 75 events scheduled for October, there's probably an event scheduled for your community, so RSVP now for one of our meetups. Join us! Upcoming Tech4Good Events This roundup of face-to-face nonprofit tech events includes meetups from NetSquared, NTEN's Tech Clubs, and other awesome organizations. If you're holding monthly events that gather the #nptech community, let me know, and I'll include you in the next community calendar, or apply today to start your own NetSquared group. Jump to events in North America or go international with events in Africa and Middle East Asia and Pacific Rim Central and South America Europe and U.K. North America Monday, October 2, 2017 Vancouver, British Columbia: Photojournalism for Nonprofits and Small Businesses #Storymakers2017 Tuesday, October 3, 2017 Portland, Oregon Happy Hour with Nonprofit Tech Luminaries NTEN Presents: Oregon Nonprofit Tech Roundup Montréal, Québec: Développer une Présence Web Efficace Naples, Florida: Tools for Effective Email Communication Mason, Ohio: Connecting Nonprofits and Techies in Cincinnati Wednesday, October 4, 2017 Pittsburgh, Pennsylvania: Bagels and Bytes — Allegheny Baltimore, Maryland: WordPress 101 and Tech Help and Consultations San Francisco, California: Code for America Civic Hack Night (Weekly) Thursday, October 5, 2017 Calgary, Alberta: Evening on Data Ethics Friday, October 6, 2017 Seattle, Washington: King County Executive Director Forum Monday, October 9, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Tuesday, October 10, 2017 Columbus, Ohio: Nonprofit IT Forum Decatur, Illinois: Free and Low-Cost Resources for Nonprofit Software Ottawa, Ontario: Review Progress on Data Analysis Projects Wednesday, October 11, 2017 Mason, Ohio: Help Create an App for Homeless to Manage Money More Effectively San Francisco, California: Code for America Civic Hack Night (Weekly) Boston, Massachusetts: Tech Networks of Boston Roundtable: Building an Effective Data Culture at Your Nonprofit O’Fallon, Missouri: Learn How to Apply for a $10,000 per Month Google AdWords Grant Phoenix, Arizona: Website Building 101: Quick and Easy Web Presence for Nonprofits Los Angeles, California: Nonprofit Volunteer Management Chicago, Illinois: Net Neutrality Thursday, October 12, 2017 Chicago, Illinois: It's Never Too Late: How Your CRM Can Save End-of-Year Fundraising Seattle, Washington: What You Need to Know About Board Governance Saturday, October 14, 2017 Saint Paul, Minnesota: Minnesota Blogger Conference | by Get Social Events, the Social Media Breakfast Folks ($25) Monday, October 16, 2017 San Francisco, California: Social Impact in Tech: Panel Discussion with LinkedIn, Lyft, and Salesforce Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Seattle, Washington: Fall Nonprofit Technology Speed Geek Tuesday, October 17, 2017 Buffalo, New York: Essential Data Management Orlando, Florida: Tech4Good Orlando October: Search Engine Optimization and Strategy Wednesday, October 18, 2017 San Francisco, California: Code for America Civic Hack Night (Weekly) Houston, Texas: NetSquared Houston Research Triangle Park, North Carolina: Crowdsourcing Change: The Social Web to Nonprofits Thursday, October 19, 2017 Monroeville, Pennsylvania: TechNow 2017 Conference Sweet Briar, Virginia: Using Data to Reach Your Audience Friday, October 20, 2017 West Chester, Ohio: Southwest Ohio Give Camp Boston, Massachusetts: Tech Networks of Boston Roundtable: Can Appmaker Help You? A Free Database Tool from Google Monday, October 23, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Austin, Texas: Engaging the Millennial Donor Tuesday, October 24, 2017 Vancouver, British Columbia: How Delivering Webinars Can Benefit Your Mission Wednesday, October 25, 2017 Baltimore, Maryland: Salesforce 101 for Nonprofits and Free Tech Help and Guidance San Francisco, California: Code for America Civic Hack Night (Weekly) Seattle, Washington: Recruit, Engage, and Retain a Great Board Monday, October 30, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Tuesday, October 31, 2017 Seattle, Washington: Bolder and Wiser: Nonprofit Advocacy Rights (Part 2) Central and South America Wednesday, October 4, 2017 Guatemala City, Guatemala: Pechakucha Guatemala — Historias Digitales Vol. 15 Africa and Middle East Sunday, October 1, 2017 Cotonou, Benin: L'Utilité des Logiciels de TechSoup dans la Progression d Nos ONG dans le Monde Kampala, Uganda: Digital Storytelling for Nonprofits Workshop Monday, October 2, 2017 Ouagadougou, Burkina Faso: Monthly Meeting of Local Members Saturday, October 7, 2017 Matloding, South Africa: Technology for Rural Development Bunda, Tanzania: Microsoft Cloud Computing Morogoro, Tanzania: Role of ICT for Farm Management Wednesday, October 11, 2017 Bamenda, Cameroon: How to Create Digital Stories Friday, October 13, 2017 Katabi, Uganda: Using Social Media Applications for Development Pangani, Tanzania: Storymakers Campaign Saturday, October 14, 2017 Bunda, Tanzania: Microsoft Cloud Computing Sunday, October 15, 2017 Cotonou, Benin: Les Logiciels Mis en Don par Techsoup.org pour les ONG et Association au Benin Saturday, October 21, 2017 Bunda, Tanzania: Microsoft Cloud Computing Saturday, October 28, 2017 Bunda, Tanzania: Microsoft Cloud Computing Morogoro, Tanzania: Technology for Livelihood Improvement Asia and Pacific Rim Tuesday, October 3, 2017 Taipei, Taiwan: NGO要怎麼搞群眾募資?- 綠盟經驗談 Wednesday, October 4, 2017 Singapore, Singapore: DataJam! Tuesday, October 10, 2017 Wellington, New Zealand: Set Your Email Newsletter on Fire | Net2Welly Oct '17 Meetup Sunday, October 15, 2017 Jakarta, Indonesia: Web Hosting Europe and U.K. Tuesday, October 3, 2017 Paris, France: AdWords Express — Grands Débutants Wednesday, October 4, 2017 Puidoux, Switzerland: 7ème Journée Pédagogique ESV-SPV (AVMES/AVMD) Friday, October 6, 2017 Carouge, Switzerland: 12h de Hackaton pour Afficher les Termes et Conditions, Que Vous Ne Lirez Jamais Saturday, October 7, 2017 Genève, Switzerland: LINforum3 Partage Idée, Réflexion, Projet, Startup, Service … Responsables! Wednesday, October 11, 2017 Cambridge, United Kingdom: Social Media Surgery — Hands-on Help with Social Media Thursday, October 12, 2017 Paris, France: La Data pour Vous Renforcer Saturday, October 14, 2017 Pully, Switzerland: Intergen.Digital à Pully Monday, October 16, 2017 Birmingham, United Kingdom: Social Media Session Tuesday, October 17, 2017 Dublin, Ireland: Smart Cities for Good Wednesday, October 18, 2017 Paris, France: Forum National des Associations et des Fondations Bordeaux, France: Les Personas pour Optimiser Votre Conversion Thursday, October 19, 2017 Bath, United Kingdom: Tech for Good Community Mapping Paris, France: Brainstorming, Plans d'Actions sur Internet Wednesday, October 25, 2017 Manchester, United Kingdom: Tech for Good: At the BBC Paris, France: AdWords – Initiation Paudex, Switzerland: RdV4–0.ch: 3. Solutions Informatiques — Cloud — SaaS — Services en Ligne Thursday, October 26, 2017 Barcelona, Spain: ¡Relanzamos NetSquared Barcelona! ¡Te Esperamos! Paris, France: Analytics — Initiation Tuesday, October 31, 2017 Renens, Switzerland: OpenLab: Visite du Fablab de Renens Left photo: Gregory Munyaneza / NetSquared Rwanda / CC BY Center photo: Chrispin Okumu / NetSquared Kenya / CC BY Right photo: Chrispin Okumu / NetSquared Kenya / CC BY spanhidden Full Article fundraising event
an How Can a Museum Best Protect Its Assets? By feeds.techsoup.org Published On :: Tue, 03 Oct 2017 14:03:00 GMT In this age of increasing hacks and cybercrime, the Norman Rockwell Museum has a lot of digital assets, museum operations data, and private patron data that need to be protected. Find out why Frank Kennedy, IT manager at the Rockwell museum, chose Veritas Backup Exec to be a key part of the museum's security strategy. About the Museum Norman Rockwell is one of the great iconic painters and illustrators of American life in the 20th century. His hundreds of covers for the Saturday Evening Post magazine alone are a national treasure. The Norman Rockwell Museum is located in Stockbridge, Massachusetts, where Rockwell spent the last part of his celebrated life. The museum started two years before Rockwell's death in 1978 and houses over 100,000 of his works and also those of other illustrators. The museum now has 140,000 annual visitors, and 220,000 people view its traveling exhibitions each year. It also has an active website with more than 600,000 worldwide unique visitors per year. The Museum's IT System IT Manager Frank Kennedy is an IT department of one (plus an occasional contractor). He supports 90 staff and volunteers and is responsible for critical information security and data protection for the museum. The museum's IT network consists of several large physical servers and many single-purpose virtual machines. The single-purpose virtual machines allow for emergency service without disrupting other departments. Frank says, "Most of our enterprise software is procured via TechSoup, which makes it affordable to license so many servers! We do not have to make do with weak, low-budget software." Digital Assets: Preserving Art over the Long Term Frank Kennedy explains that digital assets are of increasing importance in the work of museums. There are high-resolution images or copies of art works that must be carefully stored to preserve work in its best condition. He says that digital versions are often irreplaceable, as when the original object is disintegrating or would be damaged by further handling. The digital versions keep a faithful record of the art in its best state. The most sensitive objects of this museum include a collection of Rockwell's cellulose nitrate film negatives, which deteriorate over time. The museum also has analog audio and video tape and motion picture film that deteriorates, as well as works on paper that degrade with exposure to light. Other crucial data for the museum includes databases for collection management, point of sale records, donor management, and email. Frank's backup system is designed to be redundant on purpose. He says, "Protecting this data means keeping many copies in many places. Doing so becomes a big challenge when the size of the data becomes several terabytes. I use many layers of redundancy." The Backup Crisis As the museum's data got bigger and bigger, and server patches piled on, the museum's previous backup solution eventually became unstable. Frank reports that his backups were failing constantly and causing him stress in his careful, risk-based management approach. When he first went to get a new backup solution from TechSoup, he discovered that what he needed was not available. He says, "The cost for the options I use would have been over $4,000 per year, unbudgeted. TechSoup responded to users' desperate cry and worked with Veritas to bring Backup Exec back to TechSoup! I can't even describe my relief. Veritas Backup Exec is better than ever. It is so stable that I get suspicious and have to go look just to be sure it's really working!" Why the Norman Rockwell Museum Chose Backup Exec over Other Options Frank told me that the license he gets from TechSoup includes every option his museum needs. These options and features include Exchange Server backup Unlimited media server backups Unlimited agents for specific applications like VMware, Windows, Linux, and so on Simplified disaster recovery Protection against accidental deletion, damage, or overwriting Storing backups to disk, network share, tape (any type), or cloud — or all four at once Virtual machine snapshots that are viewable directly from the host's agent A deduplication engine so backed-up data is as clean as possible Backup retention periods that can be defined per job and per media server An excellent graphical user interface The status of every backed-up resource available at a glance Sending an email to the admin when anything goes wrong Running several jobs simultaneously (depending on server horsepower) Advice for Museums and Other Organizations Considering Veritas Backup Exec Backup Exec is powerful software geared toward backing up an entire network. It requires some study to do the installation and learn the software. You don't get phone support with the charity licensing, so you need to be comfortable Googling for answers and working in the Veritas community support forum. Frank recommends dedicating a strong server for running the software. He likes eight cores and 32 GB of RAM; hot-swappable, hot-growable RAID-5; fast network connectivity; and a very large uninterruptible power supply (UPS). Avoid the temptation to install other services or applications on what seems to be a machine that is often idle. In a Nutshell Frank's experience is that "Veritas Backup Exec is the best, most reliable, most flexible, and versatile backup software you can get. Commit the needed resources to operate it, and you will be rewarded with peace of mind and business continuity. Your donors will be pleased that you are protecting their investment so carefully." Image: Norman Rockwell Museum / All rights reserved / Used with permission spanhidden Full Article security veritas museumorhistoricalorg backupandrestore
an 5 Data Security Risks for Nonprofits (and How to Fix Them) By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 19:56:00 GMT Many nonprofits handle sensitive personal information belonging to community members — whether it's names or email addresses or payment information. But are you handling this data properly to prevent a data breach? This post is by no means exhaustive — after all, every nonprofit handles different sorts of data, and each organization has different security needs. That said, these are some practical things to think about when you review your handling of sensitive personal information. #1 Risk: Malware and Software Vulnerabilities The Problem This one may seem obvious, but with so many other security risks out there, it's easy to forget that malware still poses a major threat to your organization's data. How You Can Mitigate It To start, make sure you have antivirus software installed, and that it's up to date. In addition, you'll want to make sure your operating system and any software installed are also up to date, with all security patches installed. Beyond that, be careful what you click on. Don't download and install software from sites you don't trust. Be careful of the email attachments and links you click on — even from people you know. If you aren't expecting a file or link, click with caution. #2 Risk: Ransomware The Problem Ransomware is an especially insidious form of malware that holds your computer or data hostage unless you pay a sum of money to a criminal actor. Oftentimes, ransomware will encrypt your data, preventing you from accessing it. And according to Symantec's Director of Security Response Kevin Haley, some forms of ransomware will threaten to publicly release your data. How You Can Mitigate It Aside from up-to-date antivirus software and taking steps to avoid infection in the first place, there isn't a ton you can do to deal with a ransomware attack once your data's been encrypted. In that case, according to Haley, keeping up-to-date backups of your data is your best bet. That way, you'll be able to get back up and running quickly with minimal data loss. (TechSoup offers backup and recovery solutions from Veritas.) #3 Risk: Public Wi-Fi The Problem Public Wi-Fi is generally fine for some things, such as browsing cat videos on YouTube, or catching up on the headlines. However, for anything involving sensitive personal information, it's a security disaster waiting to happen. Bad actors could potentially eavesdrop on what you're doing while using public Wi-Fi, leaving your data and work open to prying eyes. How You Can Mitigate It First off, avoid using public, unsecured Wi-Fi when handling sensitive information — whether it's internal organizational data or your own personal banking information. Using a wireless hotspot, like those from Mobile Beacon (offered through TechSoup), instead of public Wi-Fi is an easy way to keep your data more secure. If you can't avoid public Wi-Fi, a virtual private network (VPN) is a good option — VPNs secure data between your computer and the website you're visiting. Not all VPNs provide the same level of security, though, and you'll need to make sure your VPN of choice conforms to any data security regulations that your organization may be subject to. See our previous overview of VPNs for more. #4 Risk: Inappropriate Sharing of Sensitive Information The Problem Sharing sensitive information via email, messaging apps, or similar means is a risky proposition. Email is a notoriously insecure method of communication. Email accounts are often the target of data breaches and phishing attacks. (A phishing attack is where an attacker tries to steal your account information by tricking you to enter your account information on a phony login page.) And whether it's through email or messaging app, it's all too easy to accidentally leak data by sharing it with the wrong person. How You Can Mitigate It Avoid sending sensitive information to colleagues via email. It's easier said than done, we know. Maybe you need to share a list of donor contact information with your marketing department, for example. Consider uploading it to a secure file server on your network that can only be accessed by others in the office. If your organization uses a cloud storage service like Box, consider using that instead — so long as it meets your organization's security needs. These cloud storage services usually encrypt data you upload to prevent it from getting stolen. You may also want to consider using constituent relationship management (CRM) software, a tool designed specifically to store and manage your organization's contacts. In addition, pay attention to access permissions. If you can, restrict access to sensitive information to only those who need it. Revisit your permissions settings regularly and update them as needed. To prevent your user accounts from being compromised in the first place, practice good account security hygiene. Use strong passwords and require your staff to use two-factor authentication. #5 Risk: Handling Credit Card Data The Problem A breach involving credit card data can be embarrassing for your organization, but it could wreak financial havoc on your members and supporters. All it takes is for hackers to grab a few pieces of information to rack up credit card debt in your supporters' names. How You Can Mitigate It Securing credit card information is important, but you don't have to make it up as you go. Make sure your organization conforms to payment card security standards. The Payment Card Industry Security Standards Council, as well as banks and credit card issuers, provide guidelines on how to best handle credit card information to prevent breaches. Has your nonprofit recently encountered any other notable risks? Tell us about it in the comments! spanhidden Full Article security symantec2017 privacy databases
an The Future of Security Threats: New Risks, and an Old Threat Resurfaces By feeds.techsoup.org Published On :: Fri, 20 Oct 2017 14:46:00 GMT Computer and network security is an ever-evolving field. As technology advances, cybercriminals find new ways to exploit vulnerabilities in order to get at your personal, financial, or organizational data. We recently spoke with Symantec's Director of Security Response Kevin Haley to get an idea of what threats you'll face in the next year or two. In short, expect a continuation of common threats like ransomware, as well as the emergence of new threats from connected devices and the so-called Internet of Things. Plus, keep an eye out for the resurgence of an old threat made new. Ransomware with a Twist Ransomware — malicious software that locks your data or otherwise compromises your computer in an attempt to extort money — is not a new threat. It's been around for a number of years in various forms. But according to Haley, a new form of ransomware doesn't just lock your files; instead, it threatens to publicly release your data unless you pay up. For many individuals, this may simply mean an embarrassing leakage of personal data — browser history, emails, photos, and so on. For a nonprofit, especially one that deals with sensitive sociopolitical issues, the possibility of data leakage can have more serious ramifications. It could pose a threat to the community you serve. Email That Looks Like It Came from a Co-worker In traditional phishing attempts, scammers create an email that appears to be from a legitimate source — say, Google, Amazon, or Apple. Then they attempt to steal account information, such as usernames and passwords. But in an emerging form of phishing, hackers may use emails purportedly from co-workers or business associates to try to steal information from your organization. For example, Haley says, you may receive an email from a vendor or a colleague asking for specific pieces of information (such as tax forms) or for money outright. The only problem is that these emails originate from scammers, not your colleagues. And once you email an important piece of information to these impersonators, there's no way to get it back. With proper data handling, though, you can avoid these sorts of nightmares. See our recent post, 5 Data Security Risks for Nonprofits (and How to Fix Them), to learn more. The Internet of Things Can Make People Vulnerable From smart locks to Internet-connected appliances, the Internet of Things promises to change the way we interact with all sorts of items within our homes and offices. But with this comes the potential for security headaches. According to Haley, these "smart" devices are rarely protected properly, and are easy to infect with malware. And this isn't just an issue that may cause problems some years down the line. Last year, as CNET reported, a network of malware-infected DVRs and webcams overloaded a number of popular websites and online services, temporarily knocking them offline. Word Macro Viruses Make a Comeback Perhaps the most surprising threat Haley warned about was the revival of Word macro viruses. Macro viruses use Microsoft Word's macro programming feature — typically used to automate certain tasks within Word — to infect your computer. Macro viruses have been around for many, many years. And Word disables macros by default: If you open a Word document with a macro, you'll have to click a button to tell Word to turn on any macros within that document. With this new wave of macro viruses, however, criminals employ social engineering trickery to goad you into turning on macros, allowing the macro virus to do its thing. Fortunately, you can easily protect yourself from getting infected. First, don't open file attachments from people you don't know. If you receive a Word document with macros from someone you do know, confirm with that person to make sure that they intended to send the macros and that they are safe to run. As Always, Vigilance Is Key Although specific threats may evolve over time, good security practices never go out of style. Use a security software package and keep it updated. Enforce good account security practices within your organization. Don't open file attachments from people you don't know, and don't open unexpected file downloads. Secure all your devices as best you can. And if something seems fishy — perhaps that email from your boss doesn't seem quite right — don't be afraid to question it. By taking small steps like these, you might save yourself — and your organization — some serious pain. spanhidden Full Article security symantec2017
an TechSoup to Launch New Website and Blog By feeds.techsoup.org Published On :: Thu, 02 Nov 2017 15:14:00 GMT (Please visit the site to view this video) If you're a frequent visitor to our site, you might notice a few changes in the coming weeks. That's because we're making some big improvements and are proud to announce the upcoming launch of the newly redesigned TechSoup.org. As a social enterprise, we never stop working to better serve nonprofits that share in our commitment to building a more equitable planet. In fact, TechSoup currently works with more than 965,000 NGOs in 236 countries and territories and has facilitated over $9 billion in U.S. market value of in-kind technology and funding. To that end, we've created a refreshed, modern web presence to streamline access to all our traditional and beloved products and services. It will also serve as the place where TechSoup technologies and services are first announced. The new TechSoup.org has been optimized for mobile devices, so you'll be able to experience all the new functionality wherever you go. We've also built the site with accessibility in mind on several fronts. And we're launching a new blog. Our new website will officially go live in early November. A Streamlined User Experience Nonprofits who are regular visitors to TechSoup will find a streamlined catalog that makes finding product offers and solutions easier and more efficient. Additionally, the home page has been reconfigured, sending a clearer message of who we are and what we offer as an organization. "We reduced clutter and developed a cleaner, simpler user experience with more breathing room in the interface to encourage users to do what they are intended to do on the site," says TechSoup head of user experience Tyler Benari. "It will now be easier to benefit from offerings available in and out of our catalog, interact with others in the nonprofit community, and gain access to other TechSoup services." Maximized for Mobile TechSoup's updated website will be maximized for mobile devices, allowing nonprofit staffers to take advantage of the many offers on TechSoup.org right from their phone or tablet. "It's an exciting time," Benari says. "We will now be able to literally get TechSoup into more people's hands. Redesigning the site to be more mobile-friendly will allow us to grow our community much faster and better serve the existing nonprofits we love so much." Improved Accessibility The newly redesigned TechSoup.org also features greater accessibility and is informed by Web Content Accessibility 2.0 Guidelines (WCAG). "TechSoup cares very much about accessibility and enabling access for all people," Benari says, describing two key factors that have been improved upon: contrast and code. "Our new color scheme makes it easier for people with impaired vision to access content on the site, and our code was updated to better communicate with screen readers." A New Blog Platform Finally, we're excited to introduce our new blog, more suited to integrate existing TechSoup.org content in a single, easy-to-access location. We've given the platform an upgrade, complete with a fresh look and improved functionality aimed to make blog posts more easily shareable and to promote a more robust multimedia experience. You'll continue to see improvements in the coming months as we receive feedback from the communities we serve. Also, be on the lookout for more information surrounding the new site, including a webinar and short video. spanhidden Full Article
an Egypt attracts most food manufacturing FDI By www.fdiintelligence.com Published On :: Thu, 21 Nov 2019 09:08:31 +0000 Egypt became the ‘bread basket’ of Africa in 2018, attracting the largest number of foreign investments in food manufacturing. Full Article
an Investors mobilise $40bn for African infrastructure By www.fdiintelligence.com Published On :: Thu, 21 Nov 2019 09:47:13 +0000 Twenty-five countries attracted high-ticket investment deals at the Africa Investment Forum Full Article
an EBRD president looks to African expansion By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:14 +0000 The EU is considering a broader mandate for the EBRD, and its president, Sir Suma Chakrabarti, believes its model would work in sub-Saharan Africa. Full Article