Search This Blog

Tuesday, September 14, 2010

This Linux is the most vulnerable operating system ever

What iFixit found inside the iPod Touch | Cisco's data center blitz

Network World Daily News PM

Forward this to a Friend >>>


This Linux is the most vulnerable operating system ever
OK, put your arrows, stones and guns away please. I am not saying every version of Linux is the most vulnerable and exploitable OS ever - but Damned Vulnerable Linux very well may be. And that is exactly what its developers want it to be. Read More


WHITE PAPER: F5 Networks

Connecting to the Cloud with F5 and VMware VMotion
Migrating applications, storage and VMs to the cloud is no small task. Learn how a new technology can: • Move live services without interruption • Enable VM migration across the WAN between clouds and data centers • Work without a re-architecture of local or remote networks Learn More!

WHITE PAPER: Sprint

A Unified Communications Case Study
Unified Communications helped Sprint save millions of dollars. Find out how you can save! Learn More

What iFixit found inside the iPod Touch
Pictures from inside the latest iPod touch. Read More

Cisco's data center blitz
Cisco's newest products include switches, servers, software and modules designed specifically for scalable virtual environments. Read More

Linus Torvalds becomes an American citizen
Having brought his open-source work and family to the United States from Finland some time ago, Linus Torvalds has marked an important personal milestone by attaining U.S. citizenship. Congratulations, Linus. Read More


DOWNLOAD: BlackBerry

Improve Enterprise BlackBerry Control & Security
Download your free copy of BlackBerry Enterprise Server Express and achieve; improved end-user productivity,advanced IT control and support, proven security and manageability. Download Today!

Do security regulations hinder business?
Government needs to better understand the realities of running profitable businesses -- and quickly -- as it imposes security regulations that can affect the profitability of corporations battling in a competitive environment. Read More

10 steps to easier access management
A CISO who spent two years organizing identity and access management for the 15,000 users on his network boiled the whole experience down into a 10-step process he presented at the Security Standard Conference this week. Read More

No IPv6 plan? You're behind schedule
If you haven't started deploying IPv6 -- or at least begun planning your IPv6 deployment -- you have fallen behind schedule compared to the majority of network operators worldwide, according to the latest survey about global readiness for IPv6, the long-anticipated upgrade to the Internet's main communications protocol. Read More


WEBCAST: Meraki

Why Enterprise WiFi Belongs in the Cloud
Effective management is key to wireless success. Join this live Webcast to hear how cloud-controlled wireless management provides the security, remote administration and reliability resource-constrained IT departments require. See real-world examples of organizations that have successfully deployed enterprise WiFi in the cloud. Sign up now!

Security firm warns of commercial, on-demand DDoS botnet
The security firm Damballa is warning of a large and fast growing botnet created specifically to deliver distributed denial of service (DDoS) attacks on demand for anyone willing to pay for the service. Read More

I must not play enough video games: Took me forever to decide to post something on this study
There are a few kinds of scientific findings that get people really excited: new cures and studies that prove eating/drinking/playing video games more is good for you. Read More

Cloud providers working on ways to prove they warrant trust
Finding a way to verify security within cloud provider networks is essential but won't be easy, a cloud security expert told attendees at the Security Standard conference. Read More

How physical, IT security sides can work together
A physical security specialist teams up with an IT security specialist to outline a more potent defense. From the CSO Security Standard event in New York. Read More

NASA looks at horizontal, railgun-like rocket launcher
NASA is looking hard at a way to blast spacecraft horizontally down an electrified track or gas-powered sled and into space hitting speeds of about Mach 10. The craft would then return and land on a runway by the launch site. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Ultimate guide to the flat data center network
The traditional three-tier network had a good run, but its age is starting to show in today's brave new world of server consolidation, virtual machines, cloud computing and 10Gigabit switches. Here's a look at where we've been and where we might be headed.

22 Best Android Apps
Here are the top productivity tools, utilities, and games for smartphones based on Google's Android OS.

MOST-READ STORIES

  1. Juniper to buy Belden's Trapeze, sources say
  2. Security absurdity: U.S. in sensitive information quagmire
  3. Ultimate guide to the flat data center network
  4. Is your cell phone a router?
  5. Microsoft issues service credits after cloud outage
  6. Newspaper demonstrates limitation of iPad
  7. Hidden secrets in the Cisco ASA
  8. Why Android is bad for business
  9. 802.11n Wi-Fi making huge impact 1 year after standard ratified
  10. Cisco bolsters Nexus, Catalyst switch lines

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: