Search This Blog

Thursday, November 05, 2009

Vendors scrambling to fix bug in Net's security; 10 stunning 3D buildings made with Google SketchUp

10 stunning 3D buildings made with Google SketchUp; Can we block all IPv6 tunnels in our enterprise network?
Network World logo

Daily News PM Alert

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Raritan
rule

The Importance of Measuring Power in Your Data Center
Historically, IT managers worried little about power consumption. This has quickly changed due to limits in power availability, the cost of power and companies' green initiatives. This white paper explores why and where power should be measured, what to do once data is gathered, and emerging new technologies.

Read More.

rule

Spotlight Story
Vendors scrambling to fix bug in Net's security

Software makers around the world are scrambling to fix a serious bug in the technology used to transfer information securely on the Internet. Read full story

Related News:

10 stunning 3D buildings made with Google SketchUp
These 10 models were selected from Google's 3D Warehouse.

Can we block all IPv6 tunnels in our enterprise network?
A major IPv4 to IPv6 transition technique is the use of tunnels; this is encapsulating IPv6 packets into IPv4 packets that can then be transported over the IPv4-only parts of the Internet. Those tunnels can also be used within the enterprise network either on purpose (for example to traverse some legacy network devices not supporting IPv6) or not on purpose...

Is the Cisco MARS mission going into abort on non-Cisco security devices?
Is Cisco freezing support for any new non-Cisco security devices in the Cisco Security Monitoring, Analysis and Response System (MARS) appliance?

News podcast: Network World 360
Software makers around the world are scrambling to fix a serious bug in the technology used to transfer information securely on the Internet.The flaw lies in the Secure Sockets Layer (or SSL) protocol, and lets attackers intercept secure SSL communications between computers using what's known as a man-in-the-middle attack. (5:04)

Verizon confirms Droid tethering option, hefty price tag
Verizon has confirmed that customers will have the option of connecting a laptop to their new Motorola Droid smartphones, on sale tomorrow, using the phone as a wireless modem. The carrier won't say exactly when customers can do this tethering but they are exact about what it will cost: typically, an extra $30 per month, doubling Droid-related data fees.

Apple seeks new sheriff to lock up iPhones
Just as a new hack, blacksn0w, promises to unlock iPhones with the latest Apple software from AT&T's wireless network, Apple is looking for a sheriff to lock the smartphones back up again, permanently.

Airborne lasers make high-speed military network zip
Ultra-high bandwidth lasers could soon be blasting military voice, video and data across the skies and to the ground if a hybrid optical laser system currently undergoing test pans out. 

Survey: Security Certifications Hot Among IT Pros
CompTIA finds IT pros value and seek new security-related certifications above all other areas.

IT jobs market sees tiny upturn
The IT jobs market experienced a small upturn in October, according to a survey of recruitment specialists.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Workload Automation in 2 Minutes
Running multiple, disparate job scheduling solutions can cost your company a lot of unneeded expense. See how BMC CONTROL-M gives you a single point of control for all your jobs, across all platforms and applications. Watch a 2-minute overview of BMC CONTROL-M and make the switch to enterprise workload automation.
Watch now.


Implementing Best Practices for Web 2.0 Security
Web 2.0 has ushered in a new era in how organizations communicate and do business. Learn the top 10 best Security practices to consider for getting the most from Web 2.0 with minimal risk.
Read More

 

November 05, 2009

MOST-READ STORIES

  1. Microsoft Linux: Why one free software advocate wants it
  2. The definitive Android smartphone guide
  3. Verizon confirms Droid tethering option, hefty price tag
  4. Apache Software Foundation: 10 years and still open to innovation
  5. Nortel customers: Don't panic yet
  6. How a start-up failed to take supercomputing world by storm
  7. How not to get 'royally screwed' on wireless costs
  8. Google releases search engine for e-commerce sites
  9. Tone-deaf Unisys official on why cloud computing rocks
  10. Cisco blows away Q1 expectations

IBM ISS X-Force Threat and Risk Report
Read this Trend and Risk report from IBM® ISS X-Force® to learn statistical information about all aspects of threats that affect Internet security, including software vulnerabilities and public exploitation, malware, spam, phishing, web-based threats, and general cyber criminal activity.
Download this report today!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments: