Thursday, March 04, 2010

Is Novell worth $2 billion? Exploit nullifies major Windows defense

New exploit technique nullifies major Windows defense | Microsoft at last releases famed Red Hat/Linux virtualization drivers

Network World Daily News AM Alert

Forward this to a Friend >>>


Is Novell worth $2 billion?
Novell isn't the IT giant it once was, but the company may be well worth the $2 billion offered in a takeover bid by a New York hedge fund, analysts say. Read More


WHITE PAPER: Riverbed

WAN Optimization Can Multiply IT Efficiencies
Data center consolidation, regulatory compliance and a more distributed environment are some of the IT initiatives making a comprehensive and robust disaster recovery plan more important than ever before. The Enterprise Strategy Group highlights trends in DR, the role of virtualization and the impact of WAN optimization. Learn more.

E-GUIDE: Compuware

Perfecting Application Performance
The enterprise application scene has become increasingly complicated over the years. Things have changed with the rise of Web services, SOA, Virtualization and cloud computing. In this Executive Guide explore how to get the best performance out of today's application environments. Read Now.

New exploit technique nullifies major Windows defense
The disclosure of a new exploit technique that bypasses an important Windows security feature may lead to more successful attacks against Microsoft's newer operating systems, researchers said today. Read More

Microsoft at last releases famed Red Hat/Linux virtualization drivers
Last week, Microsoft released a set of drivers that allow production versions of Red Hat to run on Hyper-V. The drivers, otherwise known as integration components, have some limitations, but they come with the full assurance that both Microsoft and Red Hat will support such an implementation. Read More

U.S. Could Challenge China on Google's Behalf at WTO
Google made news in Washington on Tuesday as the Obama Administration is reportedly considering using the World Trade Organization to help Google in its censorship battle with China. Meanwhile, a leading U.S. Senator said he plans to introduce legislation punishing companies that cave in to censorship demands. Read More


WHITE PAPER: Sophos

Windows 7 security
With the public release of Windows 7 debates and discussions have been raging on the security improvements in the new platform, and some potential problems have also emerged. In this white paper, we run through the most significant changes and additions, and look at what they might mean to users and administrators. Read now.

Medical identity theft strikes 5.8% of American adults
Identity thieves are not only interested in tapping financial resources, but also after your medical identification data and services. Read More

Researchers develop 3D graphics capability for Firefox
A group of researchers plans to release a version of the Firefox browser that includes the built-in ability to view 3D graphics, a capability that could open the door for more interactive Web pages from developers. Read More

Lawyer questions FCC's authority on net neutrality rules
The U.S. Federal Communications Commission lacks the statutory authority to make network neutrality rules prohibiting broadband providers from selectively blocking or slowing some Internet traffic, a former U.S. solicitor general said Wednesday. Read More


E-BOOK: Sybase

5 Key Mobile Management Must-Dos
Discover the five steps you can take to realize comprehensive management of your mobile environment. This IDG Playbook will guide your strategy for managing and securing your booming mobile environment, regardless of the variety of hardware and operating systems. Read More Now

HP Adds Touch, Color to EliteBook, ProBook
The six new systems with their faster Intel i5 and i7 CPUs, touchscreens, and brushed aluminum cases are intended to lure businesses off Windows XP. Read More

Internet freedom and security
It's already been a busy year in Internet freedom and security, with Google getting hacked, Hillary Clinton speaking out, the FTC notifying companies about P2P threats and ZeuS Trojan attacks. Read More

The Lucky Number 7
"Maybe we'll get lucky with this number seven." It was a throw-away comment from Steve Ballmer at the end of Microsoft's standing-room-only press conference in Barcelona for the official unveiling of Windows Phone 7 Series. Windows Mobile (7?) is dead, long live Windows Phone 7. Read More

Is Microsoft redeeming itself on security issues?
When Christian Christiansen, an IDC IT security analyst, was briefed by people at Microsoft before the company launched its Trustworthy Computing initiative eight years ago, he was frank: "I told them 'You know it's going to take you 10 years to even start to change widespread customer opinion about how bad you are.'" Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

7 most useful Firefox add-ons
Some "add-on apps" work well enough to replace a standalone desktop application. Here are seven add-ons that transform Firefox into a fully functioning application.

Fave raves: IT pros' favorite products
We asked readers about their favorite must-have network products and found there's a lot of love for products that can automate manual processes, improve visibility and management, and speed performance for end users. Products that save money are also, not surprisingly, big favorites.

MOST-READ STORIES

  1. Ten of the world's strangest social networks
  2. Wi-Fi finders let thieves track down hidden laptops
  3. 21 apps Apple doesn't want on your 3.0 iPhone
  4. 7 most useful Firefox add-ons
  5. Q&A: Verizon's LTE road map for 2010 and beyond
  6. All kinds of free stuff
  7. Microsoft: Don't press F1 key in Windows XP
  8. Why trust a hotel chain that's had three breaches in a year?
  9. The 10 all-time greatest free downloads and services
  10. Novell target of hedge fund's $2 billion takeover bid

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment