News

News Archive

  • February 25, 2005 25 Feb'05

    Intel offers 64-bit desktop processors

    Intel has introduced five processors for desktop computers using its Extended Memory Technology, EM64T, which supports hybrid...

  • February 24, 2005 24 Feb'05

    Security Bytes: Cisco patch available for ACNS flaws

    Workaround outlined for new php exploit. IBM issues patch for DB2 flaw. Payroll service goes offline to investigate security claims , and BoA loses personal data on customers.

  • February 22, 2005 22 Feb'05

    Accommodating arrays

    Modern storage arrays offer disk types to meet any need -- costly Fibre Channel (FC) disks for high-end applications requiring superior performance and availability, and lower-priced SATA disks for less-critical data. The arrays also come with mixed...

  • February 17, 2005 17 Feb'05

    Do you speak geek: All hail e-mail!

    Test your knowledge of e-mail security with this quiz.

  • February 15, 2005 15 Feb'05

    Federal agency security still poor, but improving

    Report cards give federal security a D-plus average, but the Homeland Security Department is still failing.

  • February 14, 2005 14 Feb'05

    Local mirror

  • February 14, 2005 14 Feb'05

    Local backup

  • February 14, 2005 14 Feb'05

    Strategic Storage: DR planning blueprint

    Developing a good disaster recovery (DR) plan is similar to good dental hygiene -- and almost as exciting. Similar to going to the dentist twice a year, you should also test your DR plan with the same frequency. Wait too long to clean up your plan ...

  • February 09, 2005 09 Feb'05

    The Controversy of Hacking Books and Classes

    Read this excerpt and download Chapter 1, Ethics of Ethical Hacking from Shon Harris' All-in-One Gray Hat Hacking.

  • February 08, 2005 08 Feb'05

    Loop switch

    Loop switch

  • February 07, 2005 07 Feb'05

    SATA drives product roundup

    <------No summary found------->

  • February 07, 2005 07 Feb'05

    CEOs and CIOs split on IT success

    Business and IT directors are still at loggerheads on key technology issues, according to a new survey by the Economist...

  • February 03, 2005 03 Feb'05

    Expect 13 Windows patches, some critical

    Microsoft will release patches Tuesday to fix critical security holes in Windows Media Player, MSN Messenger, Microsoft Office and Visual Studio.

  • February 02, 2005 02 Feb'05

    Compressed files strike another blow to AV

    The "alternative" .rar files are picking up where popular .zip files left off as attack vectors.

  • January 31, 2005 31 Jan'05

    ID theft remains No. 1 worry

    For the fifth straight year, the FTC said most complaints came from identity theft victims. And that's a problem for enterprises.

  • January 23, 2005 23 Jan'05

    Cyberstorm chasers: The folks who look out for the latest Internet threats

    They keep a 'round-the-clock watch on conditions in cyberspace. CTO Johannes Ullrich discusses the volunteer effort behind the SANS Internet Storm Center.

  • January 19, 2005 19 Jan'05

    Sun develops Centera competitor

  • January 17, 2005 17 Jan'05

    'Benevolent' NT4 patches a surprise to some

    Microsoft's first security bulletins of the new year included fixes for the now-unsupported Windows NT Server 4.0. On a related note, administrators are cautioned to apply one of January's patches in a specific order to avoid problems.

  • January 17, 2005 17 Jan'05

    Computer Weekly barred from briefing on national programme

    The first media demonstration of new multibillion-pound NHS IT systems took place in Whitehall last week - but technology...

  • January 11, 2005 11 Jan'05

    A 'critical' Patch Tuesday

    Microsoft issues three security bulletins for January, two of them critical. Attackers have already exploited some of the vulnerabilities.

  • January 10, 2005 10 Jan'05

    Security Bytes: George Mason U. hacked; new Trojans on the loose

    Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company.

  • January 10, 2005 10 Jan'05

    Security on a Shoestring: Creating Internet policies on the cheap

    No matter how small the organization, it's impractical to stand over employees and make sure they properly use the Internet. So here's how to write a decent acceptable use policy, and make sure everyone abides by it.

  • January 05, 2005 05 Jan'05

    New solutions for the zero hour

    IT vendors are looking to fill the gap between when a virus first hits and when its remedy is released.

  • December 30, 2004 30 Dec'04

    Archive: Bits & Bytes column library

    Bits & Bytes column library archive -- 2003 to 2004

  • December 20, 2004 20 Dec'04

    Fixes, workaround for Kerberos 5 vulnerability

    A security hole could be exploited to launch malicious code. But there are fixes and a workaround.

  • December 19, 2004 19 Dec'04

    Transforming the cybersecurity culture

    Eleven New Year's resolutions can help employees at all levels empower the security function at their organization.

  • December 19, 2004 19 Dec'04

    Security Bytes: Be aware of Google Desktop 'glitch'

    Cisco acquires Protego; Hotmail switches to Trend Micro; Red Hat, Mandrakesoft and Gentoo fix flaws.

  • December 09, 2004 09 Dec'04

    Data storage history quiz

    We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data...

  • December 08, 2004 08 Dec'04

    The security lingo of 2004

    This was the year of botnets, zombie PC armies and phishying online schemes.

  • December 05, 2004 05 Dec'04

    Think Sarbanes Oxley extension changes things? Think again

  • December 01, 2004 01 Dec'04

    Phreaks love Bluetooth

    Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless.

  • November 30, 2004 30 Nov'04

    Botnets target the enterprise warn experts

    Versatile and increasingly vicious bots will cause enterprises a lot of grief in 2005, security experts say.

  • November 21, 2004 21 Nov'04

    Crash Course: Recovery

    What good is backing up your data if you can't get it back? The goal of this Crash Course on recovery is to make sure you can effectively and efficiently recover data no matter what iteration of the lifecycle it's in. Included here are also hints on...

  • November 12, 2004 12 Nov'04

    NTFS permissions

    This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control.

  • October 31, 2004 31 Oct'04

    Fast Guide: Storage Management

    Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has ...

  • October 28, 2004 28 Oct'04

    MoD may write off £200m Chinook helicopters

    The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters.