Tuesday, January 20, 2009

Giving in to malware; Twitter limits searches on site - why?

Network World logo

Voices of Networking

NetworkWorld.com | Network Management Research Center | Update Your Profile


Sponsored by Epicor
rule

CRM Strategies for SMBs
Methodologies and practices to finding and installing the right CRM solution for your SMB are presented in this whitepaper. Discover these proven recommendations and methodologies explained here. Put them to work in your organization and improve customer service today. Download this whitepaper now.

rule

Spotlight Story
Giving in to malware

Mark Gibbs By Mark Gibbs
Gibbs thought he'd fixed his problem with malware on a Windows XP system, but as it turns out, he just made the malware work better. Here's the sad tale. Read full story

Related News:

'Net Buzz: Twitter limits searches on site … why?
Two Twitter questions have been nagging at me: Why on Earth would Twitter limit the number of searches a user may conduct -- a typical, relatively new user, such as me, not some piggy third-party app or bot?

'Net Insider: U.S. export controls: Ensuring obsolescence and declining economic competitiveness
The United States places a thicket of controls on the export of high-tech knowledge and products, and numerous restrictions on non-U.S. researchers in U.S. research centers. In recognition of the stupidity of these controls, the National Research Council is calling on the new administration to dramatically change the rules.

Small Business Tech: New Year's Resolution 2: Better sales compensation management
Figuring a good sales compensation plan is like making oil and water blend smoothly. Sales people always think management is cheating them out of commissions. Management always thinks sales people are stealing them blind. Owners of smaller companies who manage the sales people themselves often focus on the dollar paid in commission rather than thinking of the associated $20 of company revenue.

Gearhead: Finding music online and driving IMAP
Mark Gibbs discusses a cool utility for finding and recording just about any music you like and sings the praises of scripts that are really useful with GMail.

Guest Column: Can Mozilla Prove Firefox Is the Most Secure Browser
A little over a year ago, I challenged some of the security claims asserted by Mozilla that Firefox "won't harbor nearly as many security flaws as those that have Microsoft's Internet Explorer" with an Internet Explorer and Firefox Vulnerability Analysis. Of course, the publication of my report was quickly followed by a vigorous rebuttal from Mozilla's Mike Shaver (please do read it, so you have his viewpoint).

Eye on the Carriers: Eye on 2009: Telecom predictions for the New Year
Johnson Last week we looked at how well the Eye of the Carrier predictions held up for 2008. This week, let's peer into the crystal ball for 2009. You'll notice a few similarities — and a couple of key changes — for this year.

Insider Threat: How to tell which employees are more of a security risk
Recently I have read quite a bit about "insider threats" and the potential for losing customer data. But not everyone is bad, so how can I tell if I need to pay attention to certain employees?

Cool Tools: Four things to watch post-CES
As the dust settles from the 2009 Consumer Electronics Show, here are four trends worth looking at based on some products that were announced at the show.

Guest Column: Connect to Customers with Twitter
Either your customers already use social networking tools or you have an untapped, online audience. So get out there and network on Facebook, MySpace, and any of the other popular destinations. But do it on your own terms with whatever feels right; everyone can see through a business trying to co-opt new media. Here's how to make the most of one of the current favorites, Twitter.

Talking Tech: Surges, outages, and blackouts -- oh my!
Ever been relaxing at home, in front of the television or working on your computer when suddenly the power went out? It's annoying to miss a favorite show or lose a project, but what is merely an annoyance in our personal lives can be costly and even fatal to the livelihood of small and midsize businesses (SMB).


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Epicor
rule

CRM Strategies for SMBs
Methodologies and practices to finding and installing the right CRM solution for your SMB are presented in this whitepaper. Discover these proven recommendations and methodologies explained here. Put them to work in your organization and improve customer service today. Download this whitepaper now.

rule

Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.


Take Control of Network TCO by Automating IPAM
Join ESG and Infoblox to learn about reducing network TCO while boosting network availability by automating IPAM.
Review this information-packed webinar today.

 

01/19/09

Today's most-read stories:

  1. Microsoft layoffs could come next week
  2. U.S. plots major upgrade to Internet router security
  3. Nortel's bankruptcy: A long time coming
  4. FAQ: What's in store for Nortel
  5. The presidential portrait goes digital
  6. Why Windows 7 will crush Linux
  7. Worm infects 1.1M Windows PCs in 24 hours
  8. Microsoft/Nortel relationship again under microscope
  9. Windows 7 on Netbooks: Does Linux stand a chance?
  10. How Obama might get his way on BlackBerry


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment