Summary: Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security
Summary: Key carrying photons, VoIP vulnerabilities, outsourcing security, memory debugging, Exchange DST woes, and hypervisor-based virtual server security