q Amiga Launches A $2,500 Quad-Core Lunchbox PC By packetstormsecurity.com Published On :: Fri, 23 Mar 2012 06:34:35 GMT Full Article headline commodore
q Dridex Trojan Updated With AtomBombing Evasion Techniques By packetstormsecurity.com Published On :: Wed, 01 Mar 2017 15:18:00 GMT Full Article headline malware trojan
q Shifty New Variant Of Qbot Banking Trojan Spreads By packetstormsecurity.com Published On :: Fri, 01 Mar 2019 00:17:09 GMT Full Article headline malware bank trojan
q AIX 5.3 / 6.1 / 7.1 / 7.2 lquerylv Local Root By packetstormsecurity.com Published On :: Fri, 04 Nov 2016 14:44:44 GMT This exploit takes advantage of known issues with debugging functions within the AIX linker library. It takes advantage of known functionality, and focuses on badly coded SUID binaries which do not adhere to proper security checks prior to seteuid/open/writes. Full Article
q Charming Kitten Uses Fake Interview Requests To Target Public Figures By packetstormsecurity.com Published On :: Thu, 06 Feb 2020 17:27:44 GMT Full Article headline cybercrime fraud phish
q Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 23:51:18 GMT Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework. Full Article
q Google Squashes High Severity Flaws In Chrome Browser By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 15:15:16 GMT Full Article headline flaw google patch chrome
q Apple May Be Forced To Disclose China Censorship Requests By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 14:59:59 GMT Full Article headline government china apple censorship
q Quest InTrust Annotation Objects Uninitialized Pointer By packetstormsecurity.com Published On :: Fri, 13 Apr 2012 22:12:21 GMT This Metasploit module exploits an uninitialized variable vulnerability in the Annotation Objects ActiveX component. The activeX component loads into memory without opting into ALSR so this module exploits the vulnerability against windows Vista and Windows 7 targets. A large heap spray is required to fulfill the requirement that EAX points to part of the ROP chain in a heap chunk and the calculated call will hit the pivot in a separate heap chunk. This will take some time in the users browser. Full Article
q Account Details For 4 Million Quidd Users Shared On Hacking Forum By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:33:05 GMT Full Article headline hacker privacy data loss
q DNS Resolver 9.9.9.9 Will Check Requests Against IBM Threat Database By packetstormsecurity.com Published On :: Mon, 20 Nov 2017 15:19:58 GMT Full Article headline malware dns
q DNS Requests Are Routinely Spied On By packetstormsecurity.com Published On :: Mon, 20 Aug 2018 15:50:44 GMT Full Article headline privacy dns spyware
q Zyxel USG/UAG/ATP/VPN/NXC External DNS Requests By packetstormsecurity.com Published On :: Fri, 30 Aug 2019 15:57:35 GMT Zyxel USG/UAG/ATP/VPN/NXC series suffer from an issue where a DNS request can be made by an unauthenticated attacker to either spam a DNS service of a third party with requests that have a spoofed origin or probe whether domain names are present on the internal network behind the firewall. Full Article
q Macs Framework 1.14f Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Wed, 15 Apr 2020 18:33:28 GMT Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
q Centreon 19.10.5 SQL Injection By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:21:10 GMT Centreon version 19.10.5 suffers from a remote SQL injection vulnerability. Full Article
q PMB 5.6 SQL Injection By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 14:14:25 GMT PMB version 5.6 suffers from a remote SQL injection vulnerability. Full Article
q User Management System 2.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:23:07 GMT User Management System version 2.0 suffers from a remote SQL injection vulnerability that allows for authentication bypass. Full Article
q Complaint Management System 4.2 SQL Injection By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:29:20 GMT Complaint Management System version 4.2 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
q Online Shopping System Advanced 1.0 SQL Injection By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 14:56:10 GMT Online Shopping System Advanced version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q Online Course Registration 2.0 SQL Injection By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:05:54 GMT Online Course Registration 2.0 suffers from authentication bypass and remote SQL injection vulnerabilities. Full Article
q Geeklog 2.2.1 SQL Injection By packetstormsecurity.com Published On :: Mon, 27 Apr 2020 15:18:37 GMT Geeklog version 2.2.1 suffers from a remote SQL injection vulnerability. Full Article
q Project Open CMS 5.0.3 Cross Site Scripting / SQL Injection By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:48:04 GMT Project Open CMS version 5.0.3 suffers from cross site scripting and remote SQL injection vulnerabilities. Full Article
q School ERP Pro 1.0 SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:31:19 GMT School ERP Pro version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q Open-AudIT 3.2.2 Command Injection / SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:39:24 GMT Open-AudIT version 3.2.2 suffers from OS command injection, arbitrary file upload, and remote SQL injection vulnerabilities. Full Article
q hits script 1.0 SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:58:05 GMT hits script version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q iJoomla AdAgency 6.0.9 SQL Injection By packetstormsecurity.com Published On :: Sat, 02 May 2020 16:22:22 GMT iJoomla AdAgency component version 6.0.9 suffers from a remote SQL injection vulnerability. Full Article
q Fishing Reservation System SQL Injection By packetstormsecurity.com Published On :: Mon, 04 May 2020 09:02:22 GMT Fishing Reservation System suffers from multiple remote SQL injection vulnerabilities. Full Article
q addressbook 9.0.0.1 SQL Injection By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:19:23 GMT addressbook version 9.0.0.1 suffers from a remote SQL injection vulnerability. Full Article
q Online Scheduling System 1.0 SQL Injection By packetstormsecurity.com Published On :: Tue, 05 May 2020 20:46:22 GMT Online Scheduling System version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q Pisay Online E-Learning System 1.0 SQL Injection / Code Execution By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:40:34 GMT Pisay Online E-Learning System version 1.0 suffers from remote SQL Injection and code execution vulnerabilities. Full Article
q YesWiki cercopitheque 2020.04.18.1 SQL Injection By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:44:02 GMT YesWiki cercopitheque version 2020.04.18.1 suffers from a remote SQL injection vulnerability. Full Article
q Online Clothing Store 1.0 SQL Injection By packetstormsecurity.com Published On :: Wed, 06 May 2020 14:52:19 GMT Online Clothing Store version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q Online AgroCulture Farm Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:15:37 GMT Online AgroCulture Farm Management System version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q School File Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:16:26 GMT School File Management System version 1.0 suffers from a remote SQL injection vulnerability. Full Article
q Car Park Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:20:46 GMT Car Park Management System version 1.0 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
q WordPress ChopSlider 3 SQL Injection By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:47:15 GMT WordPress ChopSlider plugin version 3 suffers from a remote SQL injection vulnerability. Full Article
q Creative Zone SQL Injection By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:53:09 GMT Creative Zone suffers from a remote SQL injection vulnerability. Full Article
q MySQL G0ld Brute Forcing Utility By packetstormsecurity.com Published On :: Tue, 20 Jun 2017 12:12:12 GMT MySQL G0ld is a program that issues brute force attacks against a MySQL Server using a supplied wordlist. Full Article
q Critical FreeBSD Bug Squashed By packetstormsecurity.com Published On :: Fri, 18 Mar 2016 15:38:27 GMT Full Article headline flaw bsd
q QuickHeal Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:04:41 GMT The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
q SQLMAP - Automatic SQL Injection Tool 1.4.5 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:30:13 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
q qdPM Remote Code Execution By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 22:43:25 GMT qdPM versions prior to 9.1 suffer from a remote shell upload vulnerability that allows for remote code execution. Full Article
q Apache ActiveMQ 5.11.1 Directory Traversal / Shell Upload By packetstormsecurity.com Published On :: Thu, 05 Mar 2020 21:05:37 GMT This Metasploit module exploits a directory traversal vulnerability (CVE-2015-1830) in Apache ActiveMQ versions 5.x before 5.11.2 for Windows. The module tries to upload a JSP payload to the /admin directory via the traversal path /fileserver/..\admin\ using an HTTP PUT request with the default ActiveMQ credentials admin:admin (or other credentials provided by the user). It then issues an HTTP GET request to /admin/.jsp on the target in order to trigger the payload and obtain a shell. Full Article
q Linux Kernel Quickly Patched To Mitigate New Vuln By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:31 GMT Full Article headline linux data loss flaw patch
q Hackers Have Been Quietly Targeting Linux Servers By packetstormsecurity.com Published On :: Tue, 07 Apr 2020 16:36:08 GMT Full Article headline hacker linux
q Telus Actiontec WEB6000Q Denial Of Service By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 18:44:21 GMT Telus Actiontec WEB6000Q with firmware 1.1.02.22 suffers from a denial of service vulnerability. By querying CGI endpoints with empty (GET/POST/HEAD) requests causes a Segmentation Fault of the uhttpd webserver. Since there is no watchdog on this daemon, a device reboot is needed to restart the webserver to make any modification to the device. Full Article
q How Many Microsoft Products Can My Nonprofit Request from TechSoup? By feeds.techsoup.org Published On :: Wed, 20 Sep 2017 23:30:00 GMT https://blog.techsoup.org/posts/how-many-microsoft-products-can-nonprofits-request Here is the short answer to the question of how many Microsoft products you can request: You can get 50 of each kind of product in a two-year period — but there are some exceptions. See Microsoft products What do you mean by "each kind of product"? The Microsoft Donation Program divides products into categories called title groups. See the current list of 37. A title group contains products that serve essentially the same purpose, like PowerPoint and PowerPoint for Mac. You can get products from 10 title groups in your two-year cycle. When does this two-year cycle start and end? Is it the calendar year? No. Your nonprofit has its own two-year cycle. Your first cycle started the day you requested your first Microsoft product through TechSoup. You can see when your current cycle ends on your Microsoft Donation Center page. Outlook and PowerPoint are both title groups. Does that mean we can get 50 of each product? That's right. They can be all the Windows version, all the Mac version, or a mixture of the two. And you will be able to request products from eight more title groups. What are the exceptions you mentioned? They have to do with servers. Microsoft offers two licensing models for its server products. Core-based licensing. This licensing is based on the number of cores in the physical processors of your server machines. The product page on TechSoup will tell you whether the server uses this type of licensing. You can request up to 50 of these products from each title group, the same as desktop products. But you might have to request more than one product to fully license all the processors in your server. Non-core-based licensing. You can request a total of five server products that do not use core-based licensing. They can be from a single title group or from different title groups, but the total cannot be more than five. A lot of the title groups are for CALs and MLs. What are the limits for these? You can get 50 from each title group. CALs, or client access licenses, give you access to a server from a device like your desktop computer. MLs, or management licenses, let your device be managed by a management server. Where can I find out more? This article goes into a lot more detail and gives examples of how the various allotments work together. spanhidden Full Article microsoft
q Improve Your Fundraising Approach and Skills at NetSquared Meetups By feeds.techsoup.org Published On :: Mon, 02 Oct 2017 13:37:00 GMT Fall has arrived, and with it comes fundraising season. More than one-third of charitable giving happens in the last three months of the year, and the emergence of Giving Tuesday (on November 28 this year) makes the year's end even more critical for charities. Feeling overwhelmed? Your local NetSquared group is here to help with free, in-person events being held across the U.S. and the globe. Naples, Florida, is hosting a meetup on tools for effective email fundraising; Chippewa Falls, Wisconsin, is hosting a series of Giving Tuesday brainstorming sessions; and Chicago, Illinois, will explore how your CRM can save end-of-year fundraising plans. With more than 75 events scheduled for October, there's probably an event scheduled for your community, so RSVP now for one of our meetups. Join us! Upcoming Tech4Good Events This roundup of face-to-face nonprofit tech events includes meetups from NetSquared, NTEN's Tech Clubs, and other awesome organizations. If you're holding monthly events that gather the #nptech community, let me know, and I'll include you in the next community calendar, or apply today to start your own NetSquared group. Jump to events in North America or go international with events in Africa and Middle East Asia and Pacific Rim Central and South America Europe and U.K. North America Monday, October 2, 2017 Vancouver, British Columbia: Photojournalism for Nonprofits and Small Businesses #Storymakers2017 Tuesday, October 3, 2017 Portland, Oregon Happy Hour with Nonprofit Tech Luminaries NTEN Presents: Oregon Nonprofit Tech Roundup Montréal, Québec: Développer une Présence Web Efficace Naples, Florida: Tools for Effective Email Communication Mason, Ohio: Connecting Nonprofits and Techies in Cincinnati Wednesday, October 4, 2017 Pittsburgh, Pennsylvania: Bagels and Bytes — Allegheny Baltimore, Maryland: WordPress 101 and Tech Help and Consultations San Francisco, California: Code for America Civic Hack Night (Weekly) Thursday, October 5, 2017 Calgary, Alberta: Evening on Data Ethics Friday, October 6, 2017 Seattle, Washington: King County Executive Director Forum Monday, October 9, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Tuesday, October 10, 2017 Columbus, Ohio: Nonprofit IT Forum Decatur, Illinois: Free and Low-Cost Resources for Nonprofit Software Ottawa, Ontario: Review Progress on Data Analysis Projects Wednesday, October 11, 2017 Mason, Ohio: Help Create an App for Homeless to Manage Money More Effectively San Francisco, California: Code for America Civic Hack Night (Weekly) Boston, Massachusetts: Tech Networks of Boston Roundtable: Building an Effective Data Culture at Your Nonprofit O’Fallon, Missouri: Learn How to Apply for a $10,000 per Month Google AdWords Grant Phoenix, Arizona: Website Building 101: Quick and Easy Web Presence for Nonprofits Los Angeles, California: Nonprofit Volunteer Management Chicago, Illinois: Net Neutrality Thursday, October 12, 2017 Chicago, Illinois: It's Never Too Late: How Your CRM Can Save End-of-Year Fundraising Seattle, Washington: What You Need to Know About Board Governance Saturday, October 14, 2017 Saint Paul, Minnesota: Minnesota Blogger Conference | by Get Social Events, the Social Media Breakfast Folks ($25) Monday, October 16, 2017 San Francisco, California: Social Impact in Tech: Panel Discussion with LinkedIn, Lyft, and Salesforce Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Seattle, Washington: Fall Nonprofit Technology Speed Geek Tuesday, October 17, 2017 Buffalo, New York: Essential Data Management Orlando, Florida: Tech4Good Orlando October: Search Engine Optimization and Strategy Wednesday, October 18, 2017 San Francisco, California: Code for America Civic Hack Night (Weekly) Houston, Texas: NetSquared Houston Research Triangle Park, North Carolina: Crowdsourcing Change: The Social Web to Nonprofits Thursday, October 19, 2017 Monroeville, Pennsylvania: TechNow 2017 Conference Sweet Briar, Virginia: Using Data to Reach Your Audience Friday, October 20, 2017 West Chester, Ohio: Southwest Ohio Give Camp Boston, Massachusetts: Tech Networks of Boston Roundtable: Can Appmaker Help You? A Free Database Tool from Google Monday, October 23, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Austin, Texas: Engaging the Millennial Donor Tuesday, October 24, 2017 Vancouver, British Columbia: How Delivering Webinars Can Benefit Your Mission Wednesday, October 25, 2017 Baltimore, Maryland: Salesforce 101 for Nonprofits and Free Tech Help and Guidance San Francisco, California: Code for America Civic Hack Night (Weekly) Seattle, Washington: Recruit, Engage, and Retain a Great Board Monday, October 30, 2017 Chippewa Falls, Wisconsin: Giving Tuesday Brainstorming Tuesday, October 31, 2017 Seattle, Washington: Bolder and Wiser: Nonprofit Advocacy Rights (Part 2) Central and South America Wednesday, October 4, 2017 Guatemala City, Guatemala: Pechakucha Guatemala — Historias Digitales Vol. 15 Africa and Middle East Sunday, October 1, 2017 Cotonou, Benin: L'Utilité des Logiciels de TechSoup dans la Progression d Nos ONG dans le Monde Kampala, Uganda: Digital Storytelling for Nonprofits Workshop Monday, October 2, 2017 Ouagadougou, Burkina Faso: Monthly Meeting of Local Members Saturday, October 7, 2017 Matloding, South Africa: Technology for Rural Development Bunda, Tanzania: Microsoft Cloud Computing Morogoro, Tanzania: Role of ICT for Farm Management Wednesday, October 11, 2017 Bamenda, Cameroon: How to Create Digital Stories Friday, October 13, 2017 Katabi, Uganda: Using Social Media Applications for Development Pangani, Tanzania: Storymakers Campaign Saturday, October 14, 2017 Bunda, Tanzania: Microsoft Cloud Computing Sunday, October 15, 2017 Cotonou, Benin: Les Logiciels Mis en Don par Techsoup.org pour les ONG et Association au Benin Saturday, October 21, 2017 Bunda, Tanzania: Microsoft Cloud Computing Saturday, October 28, 2017 Bunda, Tanzania: Microsoft Cloud Computing Morogoro, Tanzania: Technology for Livelihood Improvement Asia and Pacific Rim Tuesday, October 3, 2017 Taipei, Taiwan: NGO要怎麼搞群眾募資?- 綠盟經驗談 Wednesday, October 4, 2017 Singapore, Singapore: DataJam! Tuesday, October 10, 2017 Wellington, New Zealand: Set Your Email Newsletter on Fire | Net2Welly Oct '17 Meetup Sunday, October 15, 2017 Jakarta, Indonesia: Web Hosting Europe and U.K. Tuesday, October 3, 2017 Paris, France: AdWords Express — Grands Débutants Wednesday, October 4, 2017 Puidoux, Switzerland: 7ème Journée Pédagogique ESV-SPV (AVMES/AVMD) Friday, October 6, 2017 Carouge, Switzerland: 12h de Hackaton pour Afficher les Termes et Conditions, Que Vous Ne Lirez Jamais Saturday, October 7, 2017 Genève, Switzerland: LINforum3 Partage Idée, Réflexion, Projet, Startup, Service … Responsables! Wednesday, October 11, 2017 Cambridge, United Kingdom: Social Media Surgery — Hands-on Help with Social Media Thursday, October 12, 2017 Paris, France: La Data pour Vous Renforcer Saturday, October 14, 2017 Pully, Switzerland: Intergen.Digital à Pully Monday, October 16, 2017 Birmingham, United Kingdom: Social Media Session Tuesday, October 17, 2017 Dublin, Ireland: Smart Cities for Good Wednesday, October 18, 2017 Paris, France: Forum National des Associations et des Fondations Bordeaux, France: Les Personas pour Optimiser Votre Conversion Thursday, October 19, 2017 Bath, United Kingdom: Tech for Good Community Mapping Paris, France: Brainstorming, Plans d'Actions sur Internet Wednesday, October 25, 2017 Manchester, United Kingdom: Tech for Good: At the BBC Paris, France: AdWords – Initiation Paudex, Switzerland: RdV4–0.ch: 3. Solutions Informatiques — Cloud — SaaS — Services en Ligne Thursday, October 26, 2017 Barcelona, Spain: ¡Relanzamos NetSquared Barcelona! ¡Te Esperamos! Paris, France: Analytics — Initiation Tuesday, October 31, 2017 Renens, Switzerland: OpenLab: Visite du Fablab de Renens Left photo: Gregory Munyaneza / NetSquared Rwanda / CC BY Center photo: Chrispin Okumu / NetSquared Kenya / CC BY Right photo: Chrispin Okumu / NetSquared Kenya / CC BY spanhidden Full Article fundraising event
q Microsoft's MileIQ Helps a Nonprofit Show People How to Save Lots of Energy By feeds.techsoup.org Published On :: Thu, 05 Oct 2017 14:26:00 GMT In 2015, the state of Louisiana consumed more energy per capita than any other state, according to the U.S. Energy Information Administration. Although this may not come as a complete surprise — the state's warm, muggy climate makes air conditioning a must — it's clear that Louisiana's energy-use profile needs a drastic transformation. The Energy Wise Alliance (EWA), a small nonprofit based in New Orleans, is determined to do just that. Along the way, the organization has gotten a boost from Microsoft's MileIQ app. MileIQ is a mobile app from Microsoft that automatically tracks the miles you've traveled and records all of your tax-deductible and reimbursable mileage. It's kind of like using a Fitbit, except you're tracking your driving. You can report your business drives on demand and claim your reimbursements or maximize your tax deductions. The average MileIQ user is logging $6,900 per year. Building a More Energy-Efficient Community EWA works to make energy efficiency more accessible to everyone. The organization works primarily with low-income families, tenants, and others who would otherwise be left out of the green energy revolution. EWA accomplishes its goals through both workshops and equipment upgrades at homes and businesses. Its Energy Smart for Kids program teaches students throughout the state how to lead a more energy-efficient lifestyle. These hourlong sessions cover the pitfalls of nonrenewable energy and detail more sustainable alternatives. At the end of each session, EWA volunteers hand out energy-efficiency starter kits so students can apply what they learned at home. Much like the rest of EWA's programs, Energy Smart for Kids serves underserved and underprivileged communities. In fact, many of the schools that EWA serves are Title 1 schools — schools whose students generally come from lower-income households. Aside from schools, EWA also helps nonprofits become more sustainable. Making Nonprofits Greener and More Cost-Efficient Nonprofits can benefit from EWA's work by way of simple but effective power-saving retrofits. EWA also provides volunteer labor and donates the materials for the retrofits, which means added cost savings. And as we all know, cost-saving programs are like gold dust for nonprofits. For example, volunteers from EWA revitalized the Victorian-era headquarters of the Alliance Française, a nonprofit dedicated to preserving Francophone heritage in the New Orleans community, with sustainable retrofits. As part of these upgrades, EWA sealed cracks, gaps, and openings; installed additional insulation; and programmed new thermostats. In addition, EWA gave the Alliance Française's volunteers a hands-on demonstration of behavioral changes so that they could bring this knowledge back home. EWA anticipated that the Alliance Française would save a total of $2,000 to $3,000 as a result of these green improvements. EWA's staff members also actively save money and operate more efficiently through the use of the mile-tracking app MileIQ. Saving Time and Money with MileIQ This method, as you can imagine, was time-consuming, and it brought with it the risk of human error. Most people can't possibly remember every single trip they make with their car, after all. "MileIQ is super accurate and takes the forgetting out of the equation," said Jamie Wine, executive director of EWA. For Kevin Kellup, education coordinator at EWA, MileIQ has been a game-changer. Jamie explained, "Kevin drives like crazy from school to school," racking up miles on his personal car. Now, thanks to MileIQ, Kevin can get more fairly and accurately reimbursed for his constant traveling. The most important benefit of Microsoft's MileIQ for Jamie is that his staff can be correctly reimbursed for mileage. He wants to show staff members that he values their time and effort spent traveling, which MileIQ really helps him achieve. For nonprofits, particularly small ones like EWA, it's always great when the team can receive fair compensation for its hard work. "The staff doesn't get paid much," Jamie said. And considering how important staff members' work is to the community, every penny matters. That's also where TechSoup comes in. TechSoup's Role: "Essential" Through TechSoup, eligible nonprofits can get MileIQ at 80 percent off the subscription rate. "Without TechSoup," Jamie noted, "this huge step up in technology" would not have been possible. The MileIQ discount program from Microsoft has made acquiring MileIQ way easier on the nonprofit's pocket. Having also previously obtained Microsoft Office 365 and QuickBooks Online through TechSoup, Jamie said, "TechSoup is a great equalizer." He mentioned that TechSoup helps a small nonprofit to grow into a technologically advanced organization. He added, "The super discounted products from TechSoup are like the pot of gold at the end of the rainbow." Getting MileIQ Premium Eligible nonprofits can get MileIQ at 80 percent off the individual subscription rate through TechSoup and can request an unlimited number of individual subscriptions. In addition to individual subscriptions, MileIQ is now included with an Office 365 Business Premium license. Nonprofits who currently do not have an Office 365 license can visit Microsoft's Office 365 for nonprofits page to register. This blog post was written by Nicholas Fuchs. spanhidden Full Article microsoft
q A Crypto-Mining Botnet Has Been Hijacking MSSQL Servers For Almost Two Years By packetstormsecurity.com Published On :: Wed, 01 Apr 2020 14:26:20 GMT Full Article headline hacker microsoft database fraud flaw cryptography