article thumbnail

This is the old ChiefTech blog.: Environmentally Sustainable IT

ChiefTech

Gartner has also included an estimate of the embodied (that used in design, manufacture and distribution) energy in large-volume devices, namely PCs and cell phones. " Newer Post Older Post Home Subscribe to: Post Comments (Atom) Subscribe to the chieftech.com.au Further Reading Articles and Papers Book Reviews and More Intranet 2.0

IT 40
article thumbnail

Types of Malware & Best Malware Protection Practices

eSecurity Planet

Most device or software manufacturers place backdoors in their products intentionally and for a good reason. In 2005, Sony BMG delivered millions of CDs with a rootkit that monitored listening habits and unintentionally left a backdoor to the device for cybercriminals. Backdoors. Examples of Backdoor Malware Attacks. Trojan Type .

Phishing 105