News

Network software

  • January 13, 2006 13 Jan'06

    Foundry meets data convergence with 10Gbit switches

    Foundry Networks has unveiled two 10 Gigabit Ethernet application acceleration switches to support voice over IP (VoIP) and other web applications.

  • December 12, 2005 12 Dec'05

    Step 3: What good are your findings?

    Weak passwords can be a huge security vulnerability. You can mitigate this risk by attempting to find your weaknesses before a malicious hacker does. Contributor Kevin Beaver provides a step-by-step guide on how to crack your own network passwords.

  • December 12, 2005 12 Dec'05

    Keys to finalizing your Active Directory migration

    When you migrate from Windows NT domains to Windows Active Directory domains, there are many aspects of the migration that can remain unfinished. Expert Derek Melber runs dows the list of areas that should be checked to avoid security gaps in your ...

  • December 01, 2005 01 Dec'05

    Express Newspapers broadens reach with transatlantic IP network

    The Express Newspapers Group is using a fast, high-bandwidth private Internet Protocol (IP) network to share data and applications with its New York and other offices, and to support the North American launch of OK! magazine in September.

  • November 28, 2005 28 Nov'05

    Cern lays foundations for next-generation internet with intercontinental 10 Gig Wan

    Cern, the world's largest particle physics laboratory, has built the first working intercontinental 10 Gigabit Ethernet wide area network. It will ultimately make up part of the fabric of the next-generation internet, dubbed Internet2.

  • November 28, 2005 28 Nov'05

    Cisco produces a mesh for the municipality

    Cisco is launching a range of wireless "mesh" network products designed to be deployed across towns to create municipal wireless broadband.

  • November 28, 2005 28 Nov'05

    Step 5: Configuring the VPN server

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 28, 2005 28 Nov'05

    Step 3: Setting up the certificate authority

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 28, 2005 28 Nov'05

    Step 4: Configuring the authentication server

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 22, 2005 22 Nov'05

    Influential survey says security 'set back by 6 years'

    Update: The SANS Top 20 vulnerability list for 2005 shows the bad guys attacking flawed apps and paying more attention to network holes.

  • November 21, 2005 21 Nov'05

    High bandwidth ups the ante at Coral

    Bookmaker Coral has deployed a high-bandwidth managed network to its 1,268 branches in the UK as part of a £7.1m, five-year contract with BT.

  • November 16, 2005 16 Nov'05

    Bookmaker backs BT for managed network

    Bookmaker Coral has deployed a high-bandwidth managed network to its 1,268 branches throughout the UK as part of a £7.1m, five-year contract with BT.

  • November 15, 2005 15 Nov'05

    VPN flaw could crash networks

    The National Infrastructure Security Co-ordination Centre (NISCC) has warned of a security hole in a common virtual private networking protocol, which could leave firms open to denial-of-service attacks that crash their systems.

  • November 07, 2005 07 Nov'05

    Juniper hires Black Hat hacker

    Juniper Networks has hired a hacker who exposed serious security vulnerabilities in rival Cisco’s routers, and who was sued as a result.

  • November 01, 2005 01 Nov'05

    Oracle’s turn for security scrutiny

    A security paper presented at a network security conference held by the SANs Institute in Los Angeles has warned that an attack on Oracle databases because of “weak” protection for users' passwords could put corporate data at risk of exposure.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

SearchNetworking

SearchDataCenter

SearchDataManagement

Close