The Virtualization Practice

Author Archive for James Rankin

James Rankin
DesktopVirtualization

So, you’ve run through the application analysis and vendor engagement phases. Ideally, these two phases will have provided you with (a) pertinent information about your environment, and (b) the solution or solutions that may work best to deliver the applications in your environment. The next logical stage of the project is to move toward a…

ApplicationVirtualization

Java is currently the leading exploit vector for Windows machines, and Java vulnerabilities are packaged into many of the “exploit kits” available in the darker corners of the Internet (see http://krebsonsecurity.com/2010/10/java-a-gift-to-exploit-pack-makers/). Internet Explorer, Flash Player, and even the Windows operating system itself have done a good job of either improving the security of their products or…

Google Circle
Join my Circle on Google+

Plugin by Social Author Bio

BloggerTwitterGoogle_PluseMail