Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2004 Stories
- 
                        December 30, 2004
                        30Dec2004
                        News
Archive: Bits & Bytes column libraryBits & Bytes column library archive -- 2003 to 2004 Continue Reading 
- 
                        December 20, 2004
                        20Dec2004
                        News
Fixes, workaround for Kerberos 5 vulnerabilityA security hole could be exploited to launch malicious code. But there are fixes and a workaround. Continue Reading 
- 
                        December 19, 2004
                        19Dec2004
                        News
Transforming the cybersecurity cultureEleven New Year's resolutions can help employees at all levels empower the security function at their organization. Continue Reading 
- 
                        December 19, 2004
                        19Dec2004
                        News
Security Bytes: Be aware of Google Desktop 'glitch'Cisco acquires Protego; Hotmail switches to Trend Micro; Red Hat, Mandrakesoft and Gentoo fix flaws. Continue Reading 
- 
                        December 14, 2004
                        14Dec2004
                        In Depth
Grid gobbledygook hits storageFearful as always of missing the boat, storage vendors are jumping on the grid bandwagon, unveiling visions that are about as useful today as a chocolate teapot. Continue Reading 
- 
                        December 13, 2004
                        13Dec2004
                        Tip
Pros and cons of disk-to-disk backupSome of the characteristics of disk-to-disk can make it a poor choice for your only form of backup. Continue Reading 
- 
                        December 09, 2004
                        09Dec2004
                        News
Data storage history quizWe tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data... Continue Reading 
- 
                        December 08, 2004
                        08Dec2004
                        News
The security lingo of 2004This was the year of botnets, zombie PC armies and phishying online schemes. Continue Reading 
- 
                        December 05, 2004
                        05Dec2004
                        News
Think Sarbanes Oxley extension changes things? Think again
- 
                        December 01, 2004
                        01Dec2004
                        News
Phreaks love BluetoothBluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless. Continue Reading 
- 
                        November 30, 2004
                        30Nov2004
                        News
Botnets target the enterprise warn expertsVersatile and increasingly vicious bots will cause enterprises a lot of grief in 2005, security experts say. Continue Reading 
- 
                        November 21, 2004
                        21Nov2004
                        News
Crash Course: RecoveryWhat good is backing up your data if you can't get it back? The goal of this Crash Course on recovery is to make sure you can effectively and efficiently recover data no matter what iteration of the lifecycle it's in. Included here are also hints on... Continue Reading 
- 
                        November 12, 2004
                        12Nov2004
                        News
NTFS permissionsThis excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control. Continue Reading 
- 
                        November 04, 2004
                        04Nov2004
                        Opinion
Demand more from agencies: fine tune the recruitment process and reap the rewardsUsers must be proactive in ensuring that recommended candidates are suitable Continue Reading 
- 
                        October 31, 2004
                        31Oct2004
                        News
Fast Guide: Storage ManagementManaging your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has ... Continue Reading 
- 
                        October 28, 2004
                        28Oct2004
                        News
MoD may write off £200m Chinook helicoptersThe Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters. Continue Reading 
- 
                        October 27, 2004
                        27Oct2004
                        News
Spamming the universe
- 
                        October 26, 2004
                        26Oct2004
                        News
IBM sharpens bladesIBM has announced new management tools and upgraded models of its HS20 and JS20 blade servers. Continue Reading 
- 
                        October 26, 2004
                        26Oct2004
                        News
Clear double advantageClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and... Continue Reading 
- 
                        October 21, 2004
                        21Oct2004
                        In Depth
IP everything, essentiallyWhat are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading 
- 
                        October 21, 2004
                        21Oct2004
                        In Depth
The basis of profitabilityNot so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading 
- 
                        October 18, 2004
                        18Oct2004
                        News
Smaller companies installing SP2; larger firms not
- 
                        October 08, 2004
                        08Oct2004
                        News
First integrated children's system goes liveThe first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers... Continue Reading 
- 
                        October 04, 2004
                        04Oct2004
                        News
Symantec offers bare metal restore software
- 
                        October 03, 2004
                        03Oct2004
                        News
Training for CISSP Certification: SearchSecurity.com's Security SchoolStudy guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices. Continue Reading 
- 
                        September 27, 2004
                        27Sep2004
                        News
Fast Guide: iSCSIIf you need to come up to speed rapidly on iSCSI, you've come to the right place. In this Fast Guide, we touch upon the basics and then we walk you through the pros and cons of iSCSI and Fibre Channel. Continue Reading 
- 
                        September 27, 2004
                        27Sep2004
                        News
Five steps to using the Kerberos protocolThis excerpt from "Windows Server 2003 security infrastructures" explains the basic Kerberos protocol as it is defined in RFC 1510. Continue Reading 
- 
                        September 26, 2004
                        26Sep2004
                        News
Authorize.Net says it has 'learned' from attackThe credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security. Continue Reading 
- 
                        September 23, 2004
                        23Sep2004
                        News
Multiple strategies guard youth services agencyMajor corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets. Continue Reading 
- 
                        September 22, 2004
                        22Sep2004
                        News
Security Bytes: New .jpg attack imminent; CA agrees to pay $225 million for federal violationsSanjay Kumar is indicted for securities fraud and conspiracy, while Authorize.Net is knocked offline by massive DDoS attacks. Continue Reading 
- 
                        September 21, 2004
                        21Sep2004
                        News
Survey shows SOX bringing IT, business together
- 
                        September 19, 2004
                        19Sep2004
                        News
Hackers costing enterprises billionsSymantec's semi-annual Internet Threat Report finds hackers continued adding billions to the cost of doing business on the Internet. Continue Reading 
- 
                        September 17, 2004
                        17Sep2004
                        News
Swansea strike battle to go to AcasSwansea Council and its striking IT staff are set to go to arbitration service Acas to settle a six-week dispute over a proposed... Continue Reading 
- 
                        September 14, 2004
                        14Sep2004
                        In Depth
The gift of CRMFor Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading 
- 
                        September 14, 2004
                        14Sep2004
                        In Depth
Management mattersCath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading 
- 
                        September 05, 2004
                        05Sep2004
                        In Depth
Storage Management Survival School: Lesson fiveIn this session, Jamie Gruener examines the steps you should consider in designing a tiered storage model, what the pitfalls are and the overall benefits. Continue Reading 
- 
                        September 01, 2004
                        01Sep2004
                        News
Security Bytes: MySQL upgrade urged to fix flawInternet turns 35; federal computers used as spam relays; XP SP2 a bigger pain for smaller companies. Continue Reading 
- 
                        August 27, 2004
                        27Aug2004
                        News
Over-specify when buying low cost replacement for Frame RelayA project manager reveals how a VPN saved £275,000 a year Continue Reading 
- 
                        August 24, 2004
                        24Aug2004
                        News
Latest worm uses IM to lure victimsA version of the worm which spread from infected Microsoft Internet Information Services (IIS) web servers in June has been... Continue Reading 
- 
                        August 22, 2004
                        22Aug2004
                        Tip
Microsoft supports iSCSI SAN clusters -- kind ofThis expert tip outlines how to get the support you need for iSCSI SANs using more than two clusters. Continue Reading 
- 
                        August 13, 2004
                        13Aug2004
                        In Depth
Undercover operationsComputer crime is on the rise, but collecting admissible evidence is a tricky business. Helen Beckett gets expert advice on what... Continue Reading 
- 
                        August 03, 2004
                        03Aug2004
                        News
Apple's SAN file system turns heads
- 
                        July 28, 2004
                        28Jul2004
                        News
Automated SQL injection: What your enterprise needs to knowThe second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk. Continue Reading 
- 
                        July 27, 2004
                        27Jul2004
                        News
New attacks and vulnerability trends highlighted at Black HatPresentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics. Continue Reading 
- 
                        July 26, 2004
                        26Jul2004
                        News
Fewer IT supplier conflicts are going to courtLaw firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn... Continue Reading 
- 
                        July 25, 2004
                        25Jul2004
                        News
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal IssuesFind out more about the legal issues swirling around the use of Honeypots. Continue Reading 
- 
                        July 25, 2004
                        25Jul2004
                        News
Learning about Security Threats: ProfilingA look at what it means to be a hacker. Continue Reading 
- 
                        July 18, 2004
                        18Jul2004
                        News
Debian fixes multiple flawsDenial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious code has been fixed. Continue Reading 
- 
                        July 18, 2004
                        18Jul2004
                        News
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and moreWith the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data. Continue Reading 
- 
                        July 14, 2004
                        14Jul2004
                        News
Continuous backup gains tractionFor continuous backup technology, 2004 is the year that vendors have moved from promises to actual products. Although the market is still small -- inhabited by startups such as Revivio, Mendocino Software, Alacritus and XOsoft -- the buzz is ... Continue Reading 
- 
                        July 09, 2004
                        09Jul2004
                        News
Old Mutual rolls out web reporting software to meet new regulationsFinancial services group Old Mutual has rolled out web-based reporting software across its business worldwide to consolidate data... Continue Reading 
- 
                        July 07, 2004
                        07Jul2004
                        News
Deals abound for high-end storageThink high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to give buyers the best possible deals. Continue Reading 
- 
                        June 21, 2004
                        21Jun2004
                        News
Users at risk after web host attackUsers have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services. Continue Reading 
- 
                        June 01, 2004
                        01Jun2004
                        News
Startup steals a win with thin provisioningThe Allant Group chose 3Pardata for its thin provisioning software, while dirty sales tactics kept EMC out of the deal. Continue Reading 
- 
                        June 01, 2004
                        01Jun2004
                        News
From exposition to exploit: One security book's storyA new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring. Continue Reading 
- 
                        June 01, 2004
                        01Jun2004
                        News
Ex-helicopter chief says pilot verdict is 'ridiculous'A former director of helicopter procurement at the Ministry of Defence has described the blaming of the pilots for the crash on... Continue Reading 
- 
                        June 01, 2004
                        01Jun2004
                        News
Report finds computer system likely culprit in Chinook crashA former air commodore - one of the highest ranks in the RAF - has questioned the airworthiness of the Chinook Mk2 helicopter... Continue Reading 
- 
                        June 01, 2004
                        01Jun2004
                        News
Chinook 10 years onThis week sees the 10th anniversary of the Chinook ZD576's crash, as former top military officers cast doubt on the finding that... Continue Reading 
- 
                        May 28, 2004
                        28May2004
                        News
Ex-RAF chief says no to blame on ChinookA former RAF air commodore has questioned the integrity of systems and the airworthiness of the type of Chinook helicopter which... Continue Reading 
- 
                        May 23, 2004
                        23May2004
                        News
Hacking for Dummies: Chapter 10 -- Wireless LANsRead Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading 
- 
                        May 19, 2004
                        19May2004
                        News
LAN-free, serverless and domino backups, oh my.In case you've missed anything, here's a roundup of some of the best original technical content that appeared on SearchStorage.com the week of May 10-14. Tips and Ask the Experts Q&A's cover LAN-free, serverless and domino backups. Continue Reading
- 
                        May 19, 2004
                        19May2004
                        News
IT experts not losing sleep over code theftDays after Cisco acknowledged someone may have stolen source code from its network, IT experts said they doubt it will amount to anything catastrophic. After all, source code has made it onto the Internet before, and there's no proof it has ever led... Continue Reading 
- 
                        May 16, 2004
                        16May2004
                        News
Consequences of Cisco source code theft unclearOpinions are divided on the impact of stolen data now circulating on the Internet. Continue Reading 
- 
                        May 13, 2004
                        13May2004
                        News
Hacking For Dummies: Chapter 7 -- PasswordsIn his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks. Continue Reading 
- 
                        May 10, 2004
                        10May2004
                        News
'Whispering keyboards' could be next attack trendAn IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes. Continue Reading 
- 
                        May 02, 2004
                        02May2004
                        News
Return to sender?Several researchers have identified a new e-mail attack that can be used to swamp enterprise e-mail servers, as well as some secondary systems. Continue Reading 
- 
                        April 27, 2004
                        27Apr2004
                        News
Backup school: Quiz two, answer sixHere is the answer to Backup school quiz two, question six. Continue Reading 
- 
                        April 21, 2004
                        21Apr2004
                        News
Startup offers fixed-content archive for multiple applicationsFormer CTO of the New York Times has started Archivas, a company that archives fixed content from different applications in a single, centralized repository for half the price of EMC's Centera. Continue Reading 
- 
                        April 20, 2004
                        20Apr2004
                        News
Cisco SNMP flaw allows for DoS attacksA coding flaw in Cisco's IOS software for certain routers and switches could leave networks vulnerable to denial-of-service attacks. Continue Reading 
- 
                        April 19, 2004
                        19Apr2004
                        News
UK clearing house joint venture to provide online payment serviceUK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading 
- 
                        April 15, 2004
                        15Apr2004
                        News
Bacs launches online billing serviceUK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading 
- 
                        April 11, 2004
                        11Apr2004
                        News
IBM and Cisco battle remote attack vulnerabilities
- 
                        March 28, 2004
                        28Mar2004
                        News
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other DoodzRead Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade. Continue Reading 
- 
                        March 22, 2004
                        22Mar2004
                        In Depth
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front... Continue Reading 
- 
                        March 17, 2004
                        17Mar2004
                        News
Best practices for enabling and maintaining complianceAs part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice president of IT at Essex Investment Management Company and Enterprise Storage Group's Peter Gerr discussed... Continue Reading 
- 
                        March 15, 2004
                        15Mar2004
                        In Depth
Achieving the goal of CIOWhat exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading 
- 
                        March 01, 2004
                        01Mar2004
                        News
There's no government like no government
- 
                        February 24, 2004
                        24Feb2004
                        News
Exploiting Software: How to Break Code, Chapter 7 -- Buffer OverflowThis excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw. Continue Reading 
- 
                        February 23, 2004
                        23Feb2004
                        News
Somerfield speeds up product development with online systemSupermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product... Continue Reading 
- 
                        February 15, 2004
                        15Feb2004
                        News
Seagate touts SAS drives as faster alternative to SATASeagate is set to demonstrate a 2.5-inch hard drive based on the serial-attached SCSI interface. The company says the product will fill the need for a smaller, faster and more reliable alternative to serial ATA disks. Continue Reading 
- 
                        February 09, 2004
                        09Feb2004
                        News
More questions and answers from SAN School lesson # 5Here are additional questions and answers from SAN School Lesson 5: Designing a SAN. The questions cover topics ranging from how to determine an effective SAN design to meet your needs, to the differences between fabric switches and loop switches. Continue Reading 
- 
                        February 09, 2004
                        09Feb2004
                        News
More questions and answers from SAN school lesson # 8Here are SAN School Professor Chris Poelker's answers to more user submitted questions from SAN School Lesson 8, "Tying your SANs together." Q&A's cover topics ranging from what causes SAN problems, to preventing equipment problems. Continue Reading 
- 
                        January 23, 2004
                        23Jan2004
                        News
Banks turn to alert systems to fight back against phishing attacksUK banks and retailers are investigating e-mail monitoring services that could offer early warning of “phishing” attacks by... Continue Reading 
- 
                        January 15, 2004
                        15Jan2004
                        News
Resource guide to disk-based backup
- 
                        January 12, 2004
                        12Jan2004
                        In Depth
Thought for the day: Flights of fancyThe Windows versus Linux debacle continues to escalate into a heady mix of emotion, mud-slinging and complexity Continue Reading 
- 
                        January 04, 2004
                        04Jan2004
                        News
Security legislation: Where's the breach?Security legislation isn't all that it's cracked up to be. Find out how California's SB 1386 is letting some breaches fall through the cracks. Continue Reading 

 
		