UptonArt.net
Menu

Home
Art
Music
Web Templates
Résumé
Links

Welcome to UptonArt.net

New Reviews: Astrosoniq, SSOGE

posted March 22nd, 2011 in Music,Reviews

New review posted at antiMusic: Astrosoniq – Quadrant

Also, new review posted at Metalship: Silent Stream of Godless Elegy – Návaz

No Comments on New Reviews: Astrosoniq, SSOGE

New Review: Still Rain

posted March 15th, 2011 in Music,Reviews

New review posted at antiMusic: Still Rain – Bitter Black Water

No Comments on New Review: Still Rain

Where are the photos?

posted March 12th, 2011 in Site News

I’ve more or less written the display end for the updated art and photo galleries, so where are the photos? I wrote a quick and dirty program to easily convert photos to the correct format for the site, but it’s a daunting task to comb multiple hard drives and go through even just a couple years worth of photos and decide which ones are worth sharing. (Plus, I have to take into account how much of my hosting space it’s going to eat up!) Hopefully some will start showing up soon.

No Comments on Where are the photos?

New Review: Augury

posted March 7th, 2011 in Music,Reviews

New review posted at antiMusic: Augury – Concealed (reissue)


No Comments on New Review: Augury

Aiming for a Secure Network

posted March 4th, 2011 in Music

Secure network access control also provides additional levels of protection around individual parts of the network after a user has gained access to a computer system (this link will tell you everything you need to know about network security). You may also look at Business Internet packages and see how they can secure your network.

Dedicated Server Extensions

Multi-Factor Authentication Authentication- The authentication protocol used to establish a multi-factor authentication between two entities. This type of authentication provides additional layers of security. Intel AES New Instructions Intel AES New Instructions (Intel AES-NI) are a set of instructions that enable fast and secure data encryption and decryption. AES-NI are valuable for a wide range of cryptographic applications, for example: applications that perform bulk encryption/decryption, authentication, random number generation, and authenticated encryption.

Secure Key Intel Secure Key consists of a digital random number generator that creates truly random numbers to strengthen encryption algorithms.

Intel Trusted Execution Technology

Intel Trusted Execution Technology for safer computing is a versatile set of hardware extensions to Intel processors and chipsets that enhance the digital office platform with security capabilities such as measured launch and protected execution. It enables an environment where applications can run within their own space, protected from all other software on the system.

Execute Disable Bit

Execute Disable Bit is a hardware-based security feature that can reduce exposure to viruses and malicious-code attacks and prevent harmful software from executing and propagating on the server or network.

No Comments on Aiming for a Secure Network

« older posts             newer posts »

Recent