Search This Blog

Friday, January 23, 2009

GSM Hacking: The next big thing? The microblogging apocalypse is here; Get rid of spanning tree?

Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Infoblox
rule

Take Control of Network TCO by Automating IPAM
Growing networks are in a vicious circle of rising costs, increasing downtime, and rising staff stress. Join Enterprise Strategy Group's Jon Oltsik, for this information-packed webinar on how enterprises can reduce stress and operational expenses by automating IPAM, listen today.

rule

Spotlight Story

GSM Hacking: The next big thing?
By Jimmy Ray Purser
What IF someone took the time, built the gear and compiled the tables? Hmmm... That would be something. All I need to do is crack one segment and I can decode a full SMS message. The odds are on the hackers side in finding just one of 200 segment values in even an incomplete table. Read full story

Related News:

News podcast: Network World 360
The White House has confirmed that President Barack Obama will have the use of a security-enhanced BlackBerry. South Korea's Samsung Electronics recorded a net loss for the last three months of 2008, while its net profit for the entire year fell 26 percent. (5:30)

The microblogging apocalypse is here
Monash: Everybody knows that most of what you find on the Internet is junk, often junk that's been contrived to grab your attention for no legitimate reason. Some is pure or almost-pure spam; other is more borderline. That's bad enough. But what triggered today's rant is something superficially more innocuous -- Plinky. The idea of Plinky is to help people create "inspired content," by which they mean -- Plinky provides the inspiration.

Can he get rid of Spanning Tree?
On IT Asked and Answered, a user who's redesigning his building's network wonders if he can get rid of Spanning Tree and not implement VLANs. Ron Nutter takes a look at his setup, gives his advice. Add yours - or post a question of your own.

IBM out of the online services gate with mixed reviews
Seeking to break out from behind the firewall, IBM/Lotus is cloning its collaboration family for the cloud and embarking on a direction that could define the future of its applications.

'Vista Capable' case could cost Microsoft $8.5B
Microsoft would have to come up with as much as $8.5 billion to settle accounts with the customers affected by its 2006 "Vista Capable" marketing program, according to documents unsealed by a federal court.

Obama plan says cyber infrastructure is 'strategic'
The Obama administration has published a high-level plan to protect U.S. computer networks, saying it considers cyber infrastructure "a strategic asset" and will appoint a cyber adviser who will report directly to the president.

WiMAX Forum looks toward roaming
The WiMAX Forum kicked off an initiative on Thursday that someday may be critical for making WiMAX a true rival to cellular networks.

Sour Apple: Tim Cook warns iPhone rivals "don't rip off" our patents
Cox: Apple's COO Tim Cook issued a veiled warning to the company's iPhone rivals this week, especially Palm with its well-recieved but not-yet-released Palm Pre smartphone.

Top Reasons You Need To Add a Sitemap
Rognerud: Sitemaps have been around for a very long time. They provide an easy way to help you organize your site for users and search engines. Using targeted keywords in the link anchor text that results in a matching landing page is good practice.

The real impact of social media: almost zero
Brandon: I think Facebook and other social nets wield a lot of power. However, I don't think they actually have enough power to get someone elected.

Twitter says purported White House account was a fake
For more than a year, an @TheWhiteHouse account on Twitter Inc. 's microblogging site was used to dutifully send out more than 1,500 alerts about speeches, press briefings and other Bush administration news. The Twitter account's claim that it was officially sanctioned by the White House appeared believable, if only because it was so earnest - and boring.

ROI Case Studies Don ’t Capture Application Performance Value
Sevcik and Wetzel: We are often asked to research and document case studies showing the return on investment for an application performance management (APM) technology that improves performance and leads to financial benefits. This is classic ROI thinking. You spend money to gain money. The benefits exist, but classic ROI case studies for APM technologies simply cannot capture them. Let us explain why.

Today on Google Subnet
Employees win in Google stock option swap; Google Blogoscoped: Google China stopped censoring the BBC; and Search-Wise’s Jon Rognerud explains the top reasons you need to add a site map.


IT Outlook '09
Products of the WeekIn-depth analysis of the latest enterprise strategies, start-ups to watch, people to know, and more.

9 hot technologies for '09
9 hot technologies for '09Our annual rundown, plus a tip or two about how to approach each hot technology.

Sponsored by Infoblox
rule

Take Control of Network TCO by Automating IPAM
Growing networks are in a vicious circle of rising costs, increasing downtime, and rising staff stress. Join Enterprise Strategy Group's Jon Oltsik, for this information-packed webinar on how enterprises can reduce stress and operational expenses by automating IPAM, listen today.

rule

Preparing for the Next Cyber Attack.
Ensure you are up-to-speed on the latest security technologies available to keep your network safe in this Executive Guide. Get a thorough assessment of the corporate security threat landscape. Protect your network with data leakage protection, NAC and other technologies explained in this report.
Download this Executive Guide now.


HP Logical Servers
Make your datacenter infrastructure more adaptive with logical server technology. Find out how you can simplify routine tasks and create more efficiency within your datacenter.
Learn more

 

01/23/09

Today's most-read stories:

  1. Bull castration and snake eaters: the life of Dave Hitz
  2. Apple puts iPhone Nano and Netbook rumors to rest
  3. Blogger: Obama to get 'super-encrypted' BlackBerry
  4. Court rules Kentucky does not own the Internet
  5. How to protect your PC against the Downadup worm
  6. Downadup worm now infects 1 in every 16 PCs
  7. Juniper expected to cut jobs amid weak demand
  8. US-CERT: Microsoft's advice on Downadup is flawed
  9. Nortel chief flying in corporate jet as company files for bankruptcy
  10. Windows 7: the untold story of how the enterprise gets snubbed


Preparing for IPv6.
Get concrete facts on what IPv6 adoption means for your organization in this Executive Guide. Learn how IPv6 and IPv4 can coexist and the role of NAT devices in this new world. Find out if you need to develop a business case today and how to get started.
Download this Executive Guide now.



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: