Feeds

Top Ten Retro PC Games

A blast from the past

Business security measures using SSL

Sim City 2000

RH Numbers

A lot like the original SimCity, SimCity 2000 is focused on managing your land properties and resources. Yes indeed, it’s all about infrastructure. Keep your city growing and population happy, and you are in for hours of addictive game play. SimCity 2000 changed to an isometric aspect instead of the old overhead view, which allowed more depth with underground hidden layers. For its time the graphics on this game were really elaborate. I love this game because it is completely immersive and you’ve always got a natural disaster to cope with. F**K YOU Godzilla, that just took me a week to build!

Sim City 2000

Developer Maxis
Year of release 1993

Command and Conquer

RH Numbers

Command and Conquer took real-time strategy to another level and a wider demographic. The Global Defense Initiative and the Brotherhood of Nod are locked in a battle over a mysterious resource Tiberium, and it’s going to take all your tactical skills to conquer your opponent’s base. Its on-line multiplayer capability upped the mass slaughter and turned the genre from impenetrable, to captivating. Epic sound effects and music complimented with live action clips make this Command and Conquer stand out in its genre. Its impact can be measured by the long running franchise.

Command & Conquer

Developer Westwood Studios
Year of release 1995

Secure remote control for conventional and virtual desktops

Next page: Diablo

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.