News

News Archive

  • June 01, 2006 01 Jun'06

    NetApp adds to datacentre systems

    Network Appliance (NetApp) has announced a new line of products and services designed to enhance data management capabilities and to claim leadership of open systems storage in the enterprise datacentre.

  • June 01, 2006 01 Jun'06

    Silver Peak expands datacentre disaster recovery

    Silver Peak Systems, a provider of network acceleration solutions, has unveiled its NX-5500 network acceleration appliance.

  • June 01, 2006 01 Jun'06

    HP enhances datacentre server lines

    HP has announced that the next generation of its ProLiant and BladeSystem server families will include models powered by Intel’s latest Xeon 5100 and 5000 dual-core processors.

  • May 23, 2006 23 May'06

    Sleep out to help homeless children

    The annual Byte Night charity sleep-out will take place on 22 September at London’s Victoria Tower Gardens on the Embankment next to the House of Lords.

  • May 15, 2006 15 May'06

    Tape and disk encryption product roundup

    With tape and disk encryption products becoming more popular, storage administrators have more options in how to protect sensitive information at rest in the data center and in flight across public networks.

  • May 03, 2006 03 May'06

    Shifting services back indoors

    Almost a quarter of blue chip firms in the UK are so disillusioned with outsourcing they are hauling their services back in-house.

  • April 21, 2006 21 Apr'06

    Battery fault prompts HP laptops recall

    Hewlett-Packard is to recall more than 15,000 laptops worldwide because a fault makes them a fire hazard.

  • April 11, 2006 11 Apr'06

    SOA confuses IT heads

    Confusion surrounding the real benefits of service-oriented architecture (SOA) means CIOs are wrongly dismissing it as a cynical marketing ploy.

  • April 06, 2006 06 Apr'06

    Adding 'fudge' to your passwords

    Safe passwords are integral to web application security. Unfortunately, recalling many complicated passwords is difficult. If you must write down your passwords to remember them, use this tip to create a safer password record.

  • March 28, 2006 28 Mar'06

    Outsourced way to hire contract staff

    IT services company FDM has launched a "straight through" recruitment service to help IT departments in the finance sector recruit contract staff.

  • March 07, 2006 07 Mar'06

    Networks news in brief

    Short takes from this week's network news

  • March 02, 2006 02 Mar'06

    Appro HyperBlade servers get performance recognition

    Appro, a provider of high-performance enterprise computing systems, has announced that Appro HyperBlade Clusters have been recognised as among the world's fastest supercomputers, according to the current TOP500 list of supercomputers.

  • February 27, 2006 27 Feb'06

    Not just a big switch

    Fibre Channel directors don't just provide lots of ports, they also offer ways to connect disparate SANs, isolate data and devices within a fabric, and configure throughput for specific applications. We look at how the big three directors match up.

  • February 24, 2006 24 Feb'06

    Datacentres - the future

    Stephen Byrne, Consultant at C&C Technology takes a close look at some of the current and emerging trends in the world of the datacentre.

  • February 08, 2006 08 Feb'06

    MEF drives up quality standards in carrier Ethernet

    The Metro Ethernet Forum (MEF) has expanded its certification program to include quality of service parameters in network kit, to ensure service providers can give their customers the service they demand.

  • February 07, 2006 07 Feb'06

    Fast Guide: Storage technologies

    A guide to storage technologies for both SMBs and enterprise users. This will help you sort out the advantages, limitations and applications of each technology.

  • January 20, 2006 20 Jan'06

    Tech roundup: WAFS products

    A guide to wide-area file services (WAFS), which allow distant users to access files and applications from the datacentre as if they were local.

  • January 13, 2006 13 Jan'06

    Oracle bundles Fusion tools into one-stop SOA suite

    Oracle is offering a one-stop shop to customers seeking to build a service-oriented architecture (SOA) by bundling together several middleware products.

  • December 22, 2005 22 Dec'05

    Gaining access using application and operating system attacks

    In this excerpt from Chapter 7 of Counter Hack Reloaded: A Step-by-Step Guide to Computer Attacks and Effective Defenses, Second Edition, authors Ed Skoudis and Tom Liston explain how security professionals can use exploit frameworks to their ...

  • December 21, 2005 21 Dec'05

    Sony struggles to regain trust

    The company is trying to mend a reputation bruised over its antipiracy practices. One advocate for online civil liberties explains why redemption is a long way off.

  • December 20, 2005 20 Dec'05

    Guidance turns investigative tools on itself

    The forensics software firm says it was compromised by hackers in November. It's just one in a growing list of companies admitting to recent attacks or lax security.

  • December 18, 2005 18 Dec'05

    Trio of trouble: Malcode targets Windows, IM users

    AV firms warn IT shops to guard against Dasher, Bagle and Banbra. Dasher targets a Windows flaw patched in October, while Banbra spreads through IM.

  • December 14, 2005 14 Dec'05

    Flaws reported in Trend Micro ServerProtect

    Storage and security managers should be wary of vulnerabilities in the AV product that could enable a denial-of-service and malicious code execution. Workarounds are available.

  • December 14, 2005 14 Dec'05

    Hospital ditches EMC Centera for long-term archiving

    UHCS in Augusta, Ga., is replacing its Centera archiving system from EMC with IBM's GMAS product after performance, reliability and cost issues forced it to seek alternatives.

  • December 14, 2005 14 Dec'05

    Roundup: 2005's 'curious malicious code'

    These viruses, worms and Trojans sometimes escaped our notice. But it didn't get past one antivirus vendor, who rounded up some of the year's stranger offerings from the underground.

  • December 12, 2005 12 Dec'05

    Two Windows patches coming, IE fix uncertain

    It remains to be seen whether the software giant on Dec. 13 will address an outstanding Internet Explorer issue that is currently the target of a malicious Trojan.

  • December 12, 2005 12 Dec'05

    Titan Rain shows need for better training

    SANS says the Chinese-based attacks demonstrate the growing sophistication of hackers, and the need for IT admins who can articulate the dangers to execs.

  • December 12, 2005 12 Dec'05

    Experts: Encryption not a security cure-all

    Encrypting data offers some protection, but secure applications require much more than cryptography. Experts weigh in on your security options.

  • December 08, 2005 08 Dec'05

    IP cloaking becoming a business necessity

    Just by browsing your competitor's Web site, you might be giving away your company's most guarded secrets. Experts offer advice for countering the subterfuge and keeping secrets safe.

  • December 07, 2005 07 Dec'05

    Security pros gain ground in the board room

    Executives are paying more attention to their IT security managers and taking more responsibility for online threats against their companies, according to a new study.

  • December 06, 2005 06 Dec'05

    Cybersecurity policy takes cooperation, trust, experts say

    At the Infosecurity confab, experts explain why sharing information -- even when it's embarrassing -- is vital to securing not only corporations, but also the national infrastructure.

  • November 30, 2005 30 Nov'05

    Out-of-cycle IE patch may be imminent

    Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw.

  • November 29, 2005 29 Nov'05

    By the numbers: The new SOX breakdown

    SOX spending for 2006 is expected to be on par with last year but it's not quite dÉjÀ vu all over again. More dough will go to technology.

  • November 28, 2005 28 Nov'05

    Who owns and administers the internet's addresses?

    Given that IPv4 addresses are a finite resource, we can expect concerns over their distribution to increase in the coming years.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 22, 2005 22 Nov'05

    Influential survey says security 'set back by 6 years'

    Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes.

  • November 21, 2005 21 Nov'05

    Wireless security: Public Wi-Fi could open security holes

    A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • November 16, 2005 16 Nov'05

    Step 3: GnuPG and WinPT: Setup

  • November 16, 2005 16 Nov'05

    Step 2: Public keypairs

  • November 16, 2005 16 Nov'05

    Wireless security: Companies deal with software updates

    A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.

  • November 16, 2005 16 Nov'05

    Step 4: Encrypting e-mail in WinPT

  • November 14, 2005 14 Nov'05

    Hackers installing keyloggers at a record rate

    iDefense researchers have found that keylogger infections are up 65% over the year before, putting the private data of tens of millions of users at risk.

  • November 14, 2005 14 Nov'05

    Sony rootkit uninstaller causes bigger threat

    Princeton researchers say a security hole that appears when users try to remove Sony's copy protection software presents an even greater risk than the original rootkit.

  • November 14, 2005 14 Nov'05

    Demand for development skills soars as firms seek business edge

    Computer Weekly salary survey shows IT departments eager to secure skills for the future.

  • November 10, 2005 10 Nov'05

    Security Bytes: FTC cracks down on alleged spyware distributors

    Patches fix serious RealPlayer flaws, IM malcode launches phishing attacks; Microsoft warns of Macromedia Flash flaw; Liberty Alliance pushes stronger authentication; FEMA data security is in question; patches fix Veritas flaws and TransUnion ...

  • November 10, 2005 10 Nov'05

    IBM targets SMEs with storage products

    IBM has launched the first in a range of new storage products aimed at the SME market, following its link-up with Network Appliance.

  • November 09, 2005 09 Nov'05

    Trojans target Sony DRM and Windows

    Security researchers track two new Trojan horses. One exploits the Sony DRM program. The other could possibly take aim at the Windows flaw Microsoft patched this week.

  • November 08, 2005 08 Nov'05

    Sony takes second stab at DRM patch

    But a top executive's response to criticism over the company's use of rootkit technology has added fuel to the backlash.

  • November 06, 2005 06 Nov'05

    Hacking Windows: MSRPC vulnerabilities

    In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures.