Search This Blog

Tuesday, September 08, 2009

Steganography: Hiding secret messages in plain sight; How to get fired; Dirty vendor tricks

News podcast: Network World 360; How to get fired
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile


Sponsored by Data Domain
rule

VMware Data Backup and Recovery Best Practices
VMware offers extraordinary benefits, but it can come at the cost of extra storage, backup resources and administrative challenges. Data Domain deduplication storage offers a way out by reducing redundant data across VMware data backups, operating at disk speeds, and providing cost-effective replication for fast DR using backup images.

Click to continue.

rule

Spotlight Story
The history of steganography: Hiding secret messages in plain sight

There is a wealth of methods for creating encrypted messages you can't even tell are there. Here's a history of some of the all-time greats. Read full story

Related News:

News podcast: Network World 360
Mozilla recently released a product roadmap with a number of new details on what the foundation is hoping to release between now and the end of 2010, including information on when to expect the next major iteration of Firefox. Also, Microsoft is offering a tool to boost the responsiveness of pages in AJAX Web applications, a Microsoft official said late last week. (5:16)

How to get fired
IT professionals can do a lot to avoid layoffs, but they could be unwittingly doing even more to make themselves a target for downsizing.

Dirty vendor tricks
Enterprise software and service vendors are a tricky bunch. Like skilled magicians, they use sleight of hand and misdirection to pull cash from your company's coffers.

19 Free Web Services That Keep Saving You Money
Sifting through all of the free sites and services available on the Web, you've probably come up with some favorites, such as instant messaging tools or video streaming sites like Hulu. Those are great, but what about freebies that displace something for which you usually pay? Think beyond free antivirus software and other no-cost PC utilities--how would you like free long-distance calling, MP3 downloads, e-books, and text messaging? I'll show you how to score those and more.

Close to Patch Tuesday, new flaw surfaces
As Microsoft prepares to release patches, researchers said they've seen exploit code for a new flaw that puts organizations using Vista and Windows 7 at great risk.

Cloud Backlash: You Can't Call The Whole Thing Off
I am privileged to co-chair the SDForum Cloud Services SIG. I was a bit taken aback at the last meeting, when, during the pre-presentation networking, one attendee told me "I'm starting an anti-cloud company."

Twitter may damage your memory
Micro-blogging service Twitter could have a harmful effect on your memory, says one scientist.

Russia drops antimonopoly case against Microsoft over XP
Russia has dropped an antimonopoly case against Microsoft that was brought over the company's decision to withdraw its XP OS from the market.

Privacy watchdogs, authors urge judge to reject Google Book Search settlement
A group of prominent authors and privacy advocates, including the ACLU and Electronic Frontier Foundation, is urging a New York judge this morning to reject a proposed deal that would grant Google access to and control over millions of digitized books.

Military spends $10M to build Web sites aimed at squelching anti-US messages
Can a series of customized Web sites written in specific, strategic foreign languages actually influence how the world perceives our government's policies? And by-the-way help fight the war on terror? Sounds like a stretch but that is indeed the goal of the project known as the Trans Regional Web Initiative. 

Microsoft Subnet is giving away training from New Horizons and 15 copies of Windows Server 2008 How-To. Cisco Subnet is giving away 15 copies of Interconnecting Data Centers Using VPLS. Google Subnet is hosting many new bloggers (watch for giveaway information soon.) Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now


The Benefits of Integrated IPS
If a traditional distributed Intrusion Prevention System seems too complex then integrated IPS everywhere might be the right strategy for you. The benefits will be discussed during this Live Webcast, Thursday, September 17, 1:00 p.m. EST/10 a.m. PST. Get IPS deployment best practices and tips on selecting the right operational tools.
Register now.

 

September 08, 2009

TOP STORIES | MOST DUGG STORIES

  1. 12 words you can never say in the office
  2. Developer denies software to beat Chinese censors is malicious
  3. Encryption made easier with new key management tools
  4. How to make yourself layoff-proof
  5. Can you see John Chambers directing Cisco to buy Alcatel-Lucent?
  6. Wi-Fi encryption cracked in 60 seconds
  7. Fast, universal broadband: dirty secret about Roadblock
  8. IPhone passcode bugs revealed
  9. BBN, Raytheon and a fresh JFK conspiracy theory
  10. Dirty vendor secrets

Managed Security for a Not-So-Secure World
Today's risky data environment, which has seen 213 data breaches in the first five months of 2009, is colliding with an IT landscape of shrinking resources. This paper explains how an IT and security service provider can provide a practical, manageable and reliable solution.
Read More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: