<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Using</title> <atom:link href="https://www.iphere.com/tag/using/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Brandpost: Report: Phishing scams increasingly using mobile apps to bait victims</title><link>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims</link> <comments>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims#comments</comments> <pubDate>Wed, 07 May 2014 20:17:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Apps]]></category> <category><![CDATA[bait]]></category> <category><![CDATA[Brandpost]]></category> <category><![CDATA[increasingly]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Phishing]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[scams]]></category> <category><![CDATA[Using]]></category> <category><![CDATA[victims]]></category> <guid
isPermaLink="false">http://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims</guid> <description><![CDATA[When it comes down to it, spam and phishing scams rely primarily on exploiting trust. If the attacker can find a way to make the message appear to be from a known source, the odds that a user will take the bait are much higher. This has led to malware infections that access your contacts [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/brandpost-report-phishing-scams-increasingly-using-mobile-apps-to-bait-victims/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>SSDs: A Guide To Using Flash In The Datacenter</title><link>https://www.iphere.com/ssds-a-guide-to-using-flash-in-the-datacenter</link> <comments>https://www.iphere.com/ssds-a-guide-to-using-flash-in-the-datacenter#comments</comments> <pubDate>Thu, 13 Feb 2014 20:13:24 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[DataCenter]]></category> <category><![CDATA[Flash]]></category> <category><![CDATA[Guide]]></category> <category><![CDATA[SSDs]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/ssds-a-guide-to-using-flash-in-the-datacenter</guid> <description><![CDATA[With the price of SSDs rapidly declining, it&#8217;s tempting to put them in every new server or storage system. Not so fast. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/ssds-a-guide-to-using-flash-in-the-datacenter/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Using NetFlow To Maintain A Bandwidth Diet</title><link>https://www.iphere.com/using-netflow-to-maintain-a-bandwidth-diet</link> <comments>https://www.iphere.com/using-netflow-to-maintain-a-bandwidth-diet#comments</comments> <pubDate>Wed, 15 Jan 2014 20:12:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bandwidth]]></category> <category><![CDATA[Diet]]></category> <category><![CDATA[Maintain]]></category> <category><![CDATA[NetFlow]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/using-netflow-to-maintain-a-bandwidth-diet</guid> <description><![CDATA[Combined with content-filtering tools, the Cisco-developed network protocol can help network administrators rein in runaway bandwidth usage. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/using-netflow-to-maintain-a-bandwidth-diet/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Shingled Magnetic Recording Part 2: Using Shingled Drives</title><link>https://www.iphere.com/shingled-magnetic-recording-part-2-using-shingled-drives</link> <comments>https://www.iphere.com/shingled-magnetic-recording-part-2-using-shingled-drives#comments</comments> <pubDate>Fri, 10 Jan 2014 20:13:49 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Drives]]></category> <category><![CDATA[Magnetic]]></category> <category><![CDATA[Part]]></category> <category><![CDATA[Recording]]></category> <category><![CDATA[Shingled]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/shingled-magnetic-recording-part-2-using-shingled-drives</guid> <description><![CDATA[Disk drive vendors are using SMR to increase disk capacity, and have devised three models for shingled drives. Here are the details on this new technology. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/shingled-magnetic-recording-part-2-using-shingled-drives/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>DIY Storage: Using Virtualization To Cut Costs</title><link>https://www.iphere.com/diy-storage-using-virtualization-to-cut-costs</link> <comments>https://www.iphere.com/diy-storage-using-virtualization-to-cut-costs#comments</comments> <pubDate>Mon, 16 Sep 2013 08:14:45 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Costs]]></category> <category><![CDATA[Storage]]></category> <category><![CDATA[Using]]></category> <category><![CDATA[Virtualization]]></category> <guid
isPermaLink="false">http://www.iphere.com/diy-storage-using-virtualization-to-cut-costs</guid> <description><![CDATA[While building my own storage system as a pilot project at work, I figured out how to stretch my budget via virtualization. Here&#8217;s what I did. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/diy-storage-using-virtualization-to-cut-costs/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Using Open Source Tools For Malware Detection</title><link>https://www.iphere.com/using-open-source-tools-for-malware-detection</link> <comments>https://www.iphere.com/using-open-source-tools-for-malware-detection#comments</comments> <pubDate>Fri, 09 Aug 2013 14:17:44 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Detection]]></category> <category><![CDATA[Malware]]></category> <category><![CDATA[Open]]></category> <category><![CDATA[Source]]></category> <category><![CDATA[Tools]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/using-open-source-tools-for-malware-detection</guid> <description><![CDATA[Today&#8217;s sophisticated malware makes it difficult for small businesses with few resources for security to defend themselves. Fortunately, open source security tools such as pfSense and Snort can help. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/using-open-source-tools-for-malware-detection/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Using Human Behavioral Analysis to Stop DDOS at Layer 7</title><link>https://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7</link> <comments>https://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7#comments</comments> <pubDate>Thu, 13 Sep 2012 08:13:46 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Analysis]]></category> <category><![CDATA[Behavioral]]></category> <category><![CDATA[DDoS]]></category> <category><![CDATA[Human]]></category> <category><![CDATA[Layer]]></category> <category><![CDATA[Stop]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7</guid> <description><![CDATA[Black Lotus rolls out a patented-pending technique that it says moves beyond basic network heuristics to protect against distributed denial-of-service attacks. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/using-human-behavioral-analysis-to-stop-ddos-at-layer-7/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Using Cisco&#8217;s OTV and LISP to Improve Application Availability</title><link>https://www.iphere.com/using-ciscos-otv-and-lisp-to-improve-application-availability</link> <comments>https://www.iphere.com/using-ciscos-otv-and-lisp-to-improve-application-availability#comments</comments> <pubDate>Thu, 02 Aug 2012 20:13:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Application]]></category> <category><![CDATA[Availability]]></category> <category><![CDATA[Cisco's]]></category> <category><![CDATA[Improve]]></category> <category><![CDATA[LISP]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/using-ciscos-otv-and-lisp-to-improve-application-availability</guid> <description><![CDATA[Data center and server failures can lead to high-profile service outages. Two Cisco protocols&#8211; OTV and LISP&#8211;seek to minimize the effect of failures. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/using-ciscos-otv-and-lisp-to-improve-application-availability/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Using MPLS In The Enterprise</title><link>https://www.iphere.com/using-mpls-in-the-enterprise</link> <comments>https://www.iphere.com/using-mpls-in-the-enterprise#comments</comments> <pubDate>Sun, 26 Feb 2012 02:16:09 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Enterprise]]></category> <category><![CDATA[MPLS]]></category> <category><![CDATA[Using]]></category> <guid
isPermaLink="false">http://www.iphere.com/using-mpls-in-the-enterprise</guid> <description><![CDATA[In the data center, the MPLS/VPN architecture offers an attractive alternative to increasing the size of Layer 2 domains. Some players in the industry are promoting protocols such as Transparent Interconnection of Lots of Links (TRILL) to solve spanning tree protocol (STP) scalability problems. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/using-mpls-in-the-enterprise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Why Are You Still Using Windows XP?</title><link>https://www.iphere.com/why-are-you-still-using-windows-xp</link> <comments>https://www.iphere.com/why-are-you-still-using-windows-xp#comments</comments> <pubDate>Thu, 27 Oct 2011 02:14:46 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Still]]></category> <category><![CDATA[Using]]></category> <category><![CDATA[Windows]]></category> <guid
isPermaLink="false">http://www.iphere.com/why-are-you-still-using-windows-xp</guid> <description><![CDATA[A lot has happened since 2001. Technology evolves rapidly, and you won&#8217;t find many instances of someone using the same technology today that they used a decade ago. Yet, Windows XP just turned 10 years old and many businesses and users still rely on the antiquated operating system. When Windows XP was introduced, many of [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/why-are-you-still-using-windows-xp/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>