<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Don&#8217;t</title> <atom:link href="https://www.iphere.com/tag/dont/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Spot phishing scams and don’t take the bait</title><link>https://www.iphere.com/spot-phishing-scams-and-dont-take-the-bait</link> <comments>https://www.iphere.com/spot-phishing-scams-and-dont-take-the-bait#comments</comments> <pubDate>Thu, 09 Oct 2014 20:13:22 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[bait]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Phishing]]></category> <category><![CDATA[scams]]></category> <category><![CDATA[spot]]></category> <category><![CDATA[Take]]></category> <guid
isPermaLink="false">http://www.iphere.com/spot-phishing-scams-and-dont-take-the-bait</guid> <description><![CDATA[Can you recognize a phishing scam email when you see one? Do you know what signs to look for to identify a phishing attack, and avoid becoming a victim? In honor of National Cybersecurity Awareness Month, PhishMe has developed an infographic with helpful tips to keep you safe and secure. PhishMe points out the usual, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/spot-phishing-scams-and-dont-take-the-bait/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Don’t blame iCloud yet for hacked celebrity nudes</title><link>https://www.iphere.com/dont-blame-icloud-yet-for-hacked-celebrity-nudes</link> <comments>https://www.iphere.com/dont-blame-icloud-yet-for-hacked-celebrity-nudes#comments</comments> <pubDate>Sat, 06 Sep 2014 02:14:00 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Blame]]></category> <category><![CDATA[celebrity]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Hacked]]></category> <category><![CDATA[iCloud]]></category> <category><![CDATA[nudes]]></category> <guid
isPermaLink="false">http://www.iphere.com/dont-blame-icloud-yet-for-hacked-celebrity-nudes</guid> <description><![CDATA[Over the Labor Day weekend, hackers leaked nude images of a number of celebrities including &#8220;Hunger Games&#8221; star Jennifer Lawrence. The images appear to have been acquired from Apple’s iCloud. So, iCloud is obviously insecure and everyone should stop using it—right? Let&#8217;s just cool our jets. Yes, iCloud appears to have played a role in [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/dont-blame-icloud-yet-for-hacked-celebrity-nudes/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Hey, Apple! Don’t forget about the Windows users</title><link>https://www.iphere.com/hey-apple-dont-forget-about-the-windows-users</link> <comments>https://www.iphere.com/hey-apple-dont-forget-about-the-windows-users#comments</comments> <pubDate>Sun, 08 Jun 2014 08:13:31 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[Apple]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Forget]]></category> <category><![CDATA[users]]></category> <category><![CDATA[Windows]]></category> <guid
isPermaLink="false">http://www.iphere.com/hey-apple-dont-forget-about-the-windows-users</guid> <description><![CDATA[This week at WWDC, Apple’s annual developer conference, Apple showed off some of the new features and capabilities coming soon in iOS 8 and Mac OS X Yosemite. The level of integration between the mobile and desktop operating systems looks impressive, but maybe Apple should be focusing on how to provide that level of integration [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/hey-apple-dont-forget-about-the-windows-users/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Don’t waste your money trying to upgrade your Windows XP PC</title><link>https://www.iphere.com/dont-waste-your-money-trying-to-upgrade-your-windows-xp-pc</link> <comments>https://www.iphere.com/dont-waste-your-money-trying-to-upgrade-your-windows-xp-pc#comments</comments> <pubDate>Mon, 07 Apr 2014 14:16:21 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Money]]></category> <category><![CDATA[Trying]]></category> <category><![CDATA[Upgrade]]></category> <category><![CDATA[Waste]]></category> <category><![CDATA[Windows]]></category> <guid
isPermaLink="false">http://www.iphere.com/dont-waste-your-money-trying-to-upgrade-your-windows-xp-pc</guid> <description><![CDATA[With the end of Windows XP support from Microsoft imminent, perhaps you’ve finally made the (very wise) decision to stop using the venerable operating system. I commend you. However, if you’re planning to simply install a newer operating system on your existing hardware, you should reconsider. Sure, there&#8217;s a good chance that your existing hardware [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/dont-waste-your-money-trying-to-upgrade-your-windows-xp-pc/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Network Engineers: Don&#8217;t Be The Dinosaur</title><link>https://www.iphere.com/network-engineers-dont-be-the-dinosaur</link> <comments>https://www.iphere.com/network-engineers-dont-be-the-dinosaur#comments</comments> <pubDate>Fri, 14 Mar 2014 02:15:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Dinosaur]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Engineers]]></category> <category><![CDATA[Network]]></category> <guid
isPermaLink="false">http://www.iphere.com/network-engineers-dont-be-the-dinosaur</guid> <description><![CDATA[Network pros can&#8217;t stick with their old ways of working if they want to have a future in the world of software-defined networking. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/network-engineers-dont-be-the-dinosaur/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Don&#8217;t Let the Bleeding Edge Drain Your Data Center Dry</title><link>https://www.iphere.com/dont-let-the-bleeding-edge-drain-your-data-center-dry</link> <comments>https://www.iphere.com/dont-let-the-bleeding-edge-drain-your-data-center-dry#comments</comments> <pubDate>Tue, 24 Dec 2013 20:13:18 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bleeding]]></category> <category><![CDATA[center]]></category> <category><![CDATA[data]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Drain]]></category> <category><![CDATA[Edge]]></category> <guid
isPermaLink="false">http://www.iphere.com/dont-let-the-bleeding-edge-drain-your-data-center-dry</guid> <description><![CDATA[New technologies keep emerging that claim to transform your data center &#8212; just look at any of the 2014 prediction lists. How can you decide what makes sense to invest in now? Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/dont-let-the-bleeding-edge-drain-your-data-center-dry/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Don&#8217;t Leave Network Virtualization to Server Admins</title><link>https://www.iphere.com/dont-leave-network-virtualization-to-server-admins</link> <comments>https://www.iphere.com/dont-leave-network-virtualization-to-server-admins#comments</comments> <pubDate>Mon, 21 Oct 2013 20:16:51 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Admins]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Leave]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Server]]></category> <category><![CDATA[Virtualization]]></category> <guid
isPermaLink="false">http://www.iphere.com/dont-leave-network-virtualization-to-server-admins</guid> <description><![CDATA[Network and security engineers will be sidelined if they don&#8217;t understand where network virtualization is going, and why they need to go with it. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/dont-leave-network-virtualization-to-server-admins/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>NSA Chief: Don&#8217;t Dump Essential Security Tools</title><link>https://www.iphere.com/nsa-chief-dont-dump-essential-security-tools</link> <comments>https://www.iphere.com/nsa-chief-dont-dump-essential-security-tools#comments</comments> <pubDate>Sat, 28 Sep 2013 14:15:22 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Chief]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Dump]]></category> <category><![CDATA[Essential]]></category> <category><![CDATA[Security]]></category> <category><![CDATA[Tools]]></category> <guid
isPermaLink="false">http://www.iphere.com/nsa-chief-dont-dump-essential-security-tools</guid> <description><![CDATA[The head of the U.S. Cyber Command had come to talk about the state of cybersecurity in America. But Gen. Keith Alexander, who also directs the National Security Agency, took the offensive, delivering an impassioned defense of NSA practices Wednesday, in the wake of recriminations over the agency&#8217;s collection and handling of Americans&#8217; phone records. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/nsa-chief-dont-dump-essential-security-tools/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>5 Reasons Your Employees Don&#8217;t Care About Business Continuity</title><link>https://www.iphere.com/5-reasons-your-employees-dont-care-about-business-continuity</link> <comments>https://www.iphere.com/5-reasons-your-employees-dont-care-about-business-continuity#comments</comments> <pubDate>Tue, 16 Jul 2013 14:19:26 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[About]]></category> <category><![CDATA[Business]]></category> <category><![CDATA[care]]></category> <category><![CDATA[Continuity]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Employees]]></category> <category><![CDATA[Reasons]]></category> <guid
isPermaLink="false">http://www.iphere.com/5-reasons-your-employees-dont-care-about-business-continuity</guid> <description><![CDATA[You&#8217;ve spent months drafting, refining and testing your business continuity plan. I&#8217;ll bet it&#8217;s awesome, too, with lots of rock-solid disaster recovery steps and amazing documentation for getting back on track after a meltdown of critical systems. However, there&#8217;s one element that can sink your beautiful plan before it ever gets a chance to shine. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/5-reasons-your-employees-dont-care-about-business-continuity/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Why VPN logs don&#8217;t measure worker performance</title><link>https://www.iphere.com/why-vpn-logs-dont-measure-worker-performance</link> <comments>https://www.iphere.com/why-vpn-logs-dont-measure-worker-performance#comments</comments> <pubDate>Thu, 21 Mar 2013 08:12:56 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Don't]]></category> <category><![CDATA[Logs]]></category> <category><![CDATA[measure]]></category> <category><![CDATA[Performance]]></category> <category><![CDATA[worker]]></category> <guid
isPermaLink="false">http://www.iphere.com/why-vpn-logs-dont-measure-worker-performance</guid> <description><![CDATA[Yahoo recently made waves when CEO Marissa Mayer revoked all work-from-home arrangements and mandated that employees show up at the office. However, the real-world data Mayer reportedly based her decision upon is not a valid metric for work-from-home performance. According to reports, Mayer reviewed VPN logs to determine how much time remote workers spend connected [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/why-vpn-logs-dont-measure-worker-performance/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>