HP security blade scores impressive performance results for UDP traffic Want to get the highest possible performance out of your security device? Make sure it only handles connectionless UDP traffic the stuff that, according to studies from CAIDA and other sources makes up less than 5 percent of traffic on Internet backbones. New Firefox security technology blocks Web attacks, Mozilla claims Mozilla has released a test build of Firefox that adds new technology, dubbed "Content Security Policy," that's designed to stymie most Web-based attacks, the browser maker said. Lockheed gets $31M to bolt down military network security In its ongoing effort to tighten the security around military networks, the Defense Advanced Research Projects Agency today gave Lockheed Martin $31 million to work on its advanced network project. Protection, Meet Racket Right now, it is very straightforward — if you publish on Android Market, your application will be made available for free download outside of the Market. This appears to hold true regardless of whether or not you are using the built-in Android Market copy protection mechanisms, which have been demonstrated to be ineffective. Hacker leaks thousands of Hotmail passwords, says site More than 10,000 usernames and passwords for Windows Live Hotmail accounts were leaked online late last week, according to a report by Neowin.net. How to stop IT managers from going rogue Nearly half of all data breaches come from inside an organization, which is why industry watchers say enterprise IT departments need to invest in technology that ensures no one person has all the power. Microsoft Subnet is giving away training from Global Knowledge and 15 copies of Microsoft Expression Web 3 In Depth. Cisco Subnet is giving away training from Global Knowledge and 15 copies of Building Service-Aware Networks. Google Subnet is hosting many new bloggers. Entry forms can be found on the Cisco Subnet and Microsoft Subnet home pages. Network World on Twitter? You bet we are |
No comments:
Post a Comment