April 2008
-
April 14, 2008
14
Apr'08
Now is the time for action
The key to this topic for me was a quote from Home Secretary Jacqui Smith: "Individuals to have as much control and ownership of their own data as possible," writes Andrea Simmons, consultant forum manager, BCS Security Forum. Continue Reading
-
April 14, 2008
14
Apr'08
Fire service replaces Windows backup with more reliable tool
South Yorkshire fire service replaced its WIndows backup environment with a more reliable product from Yosemite, but it's missing support for Oracle. Continue Reading
-
April 14, 2008
14
Apr'08
Computer game, software piracy: Data leakage, copy protection lesson
The topic of our latest article from Royal Holloway MSc grads discusses protecting computer games, such as Microsoft's Halo 3, from piracy and the lessons for the rest of industry where data leakage prevention, copy protection and illegal copying of... Continue Reading
-
April 14, 2008
14
Apr'08
Intrusion detection: it's a machine's work
Our latest MSc thesis from Royal Holloway explains how machine learning can be harnessed to improve many aspects of information security including intrusion detection. Continue Reading
-
April 14, 2008
14
Apr'08
Data leak protection advice: Covert channels could be funneling data out of your company
The latest in our series of articles from MSc graduates at Royal Holloway, University of London focuses on how covert channels on a legitimate network can leak data undetected. Continue Reading
-
April 14, 2008
14
Apr'08
The re-birth of the metamorphic virus
The latest in our series of articles from MSc graduates of Royal Holloway traces the development of the virus from its early days through to the far more sophisticated polymorphic and metamorphic viruses, which could prove impossible to block. Continue Reading
-
April 13, 2008
13
Apr'08
Network session data analysis with Snort and Argus
This tip explains how to use flow/session data can complement the alert data supplied by the Snort intrusion detection system for network session data analysis. Continue Reading
-
April 13, 2008
13
Apr'08
Enigma, Ultra and Bletchley Park
Anyone with an interest in the history of cryptography and codebreaking will want to listen to l ast week's edition of The Reunion on BBC Radio 4 , in which a team of Bletchley Park employees ... Continue Reading
-
April 12, 2008
12
Apr'08
RFID chips and the London Marathon
RFID chips and the London Marathon Continue Reading
-
April 11, 2008
11
Apr'08
e-dictatorships versus e-anarchy - national and global?
What ethical questions ...need to be asked as we move into a world of surveillance, sousveillance and social networking with expectations of on-line, inter-active democracy and social inclusion ... Continue Reading
-
April 11, 2008
11
Apr'08
Three consumer apps to drive your unified comms strategy
Consumers are bringing unified communications into the enterprise whether or not you like it. Here's how they are doing it and what their habits could mean for your business. Continue Reading
-
April 11, 2008
11
Apr'08
Podcast: Round-up 11 April - MPs ask questions about Terminal 5
Weekly IT news round-up from Warwick Ashford at ComputerWeekly.com. This week: The New York Stock Exchange implementing off the shelf technology to cut time taken to access business critical data; and MPs aks questions about what really went wrong ... Continue Reading
-
April 11, 2008
11
Apr'08
HM Revenue and Customs suspends board after external review
HM Revenue and Customs has suspended its main board after an external review highlighted leadership failings and loss of public confidence in the wake of its loss of two CDs containing child benefit data on 25 million people. Continue Reading
-
April 11, 2008
11
Apr'08
Online gaming firm deploys anti-grooming technology to protect kids
Crisp, an online safety specialist, has signed a deal with Dubit to incorporate its anti-grooming technology within Dubit's interactive online games and communities. Continue Reading
-
April 11, 2008
11
Apr'08
WHSmith increases voice-based picking by 50% at distribution centre
WHSmith has increased the use of voice-based picking technology at a major distribution centre by 50%. Continue Reading
-
April 11, 2008
11
Apr'08
Grampian Fire and Rescue boosts IT architecture with Northgate
Grampian Fire and Rescue Service (GFRS) has spent £15,000 on new IT architecture to more effectively manage its services across the region. Continue Reading
-
April 11, 2008
11
Apr'08
Malware will increase 10 times in 2008, claims security firm
The UK has dropped out of the top ten for the most networked economies in the world, according to the World Economic Forum. Continue Reading
-
April 11, 2008
11
Apr'08
Small things (Twitter, Symbaloo and Plaxo)
Twitter, Symbaloo and Wecando come into focus this week Continue Reading
-
April 11, 2008
11
Apr'08
Interview: Emergency telecoms training - Oisin Walton from Telecoms sans Frontieres
Oisin Walton of Telecoms Sans Frontières talks to ComputerWeekly.com's Cliff Saran about establishing emergency telecommunations in disaster relief situations, including the technical solutions available, and how volunteers are trained for field ... Continue Reading
-
April 11, 2008
11
Apr'08
High Court quashes bid to publish ID card reviews
The High Court has quashed a decision by the Information Tribunal that early gateway reviews on the ID card scheme should be published. Continue Reading