Search This Blog

Wednesday, January 19, 2011

Cisco IOS vulnerabilities uncovered

With rate increase, Sprint bows to 4G consumption reality | The evolution of hard drives

Network World Daily News AM

Forward this to a Friend >>>


Cisco IOS vulnerabilities uncovered
Multiple vulnerabilities have cropped up in Cisco IOS that may necessitate an upgrade to IOS version 15.0(1)XA5. The vulnerabilities were reported in both Secunia and Help Net Security. Read More


RESOURCE COMPLIMENTS OF: Cisco

802.11n Network Design Training Series
Learn about RF interference and how a proactive RF management system can simplify your daily operations. Find out deployment strategies for implementing Cisco CleanAir technology into your existing 802.11n network. Register Now

WHITE PAPER: LogMeIn

Top 5 Tasks to Automate
Make routine maintenance truly routine. See how to create, schedule and roll-out repetitive, tedious IT support tasks. From defrag analysis or deploying network drive and printer mapping scripts, to software installations and patch deployments, LogMeIn can improve the way you monitor, access and maintain remote clients. Read now.

With rate increase, Sprint bows to 4G consumption reality
With the announcement today that its unlimited WiMAX mobile data plans would cost users an extra $10 per month, Sprint is acknowledging that it can't continue to offer its users all-you-can-eat data without charging more to maintain network quality. Read More

The evolution of hard drives
The history of the hard drive, through pictures. Read More

2 Wi-Fi vendors adding cloud-based networking
Two Wi-Fi vendors are adding routers, coupled with cloud-based network management to create subscription networking services, both wired and wireless. Read More

Apple shatters sales records, calls Android tablets bizarre
For the second quarter running, Apple said on Tuesday that it had set Mac, iPhone and iPad sales records. Read More


WHITE PAPER: Nimsoft

The Top 5 Server Monitoring Battles
This guide looks at some of the most pressing challenges administrators face in ensuring optimal server performance, and it offers insights into the tools and strategies required to address these demands. Learn more.

Apple stays quiet about Jobs' future
Apple executives answered questions about the company's products and the state of the Korean technology market Tuesday, but they offered no insight into the most pressing issue before the world's most valuable technology company: Is Steve Jobs coming back? Read More

MPack, NeoSploit and Zeus top most notorious Web attack toolkit list
About two-thirds of malicious Web activity can be traced back to botnets and exploit code built using popular attack toolkits like MPack and Zeus sold in the underground economy, according to a new Symantec report. Read More

AT&T iPad hackers' chats were turned in by secret source
The government's case against two men charged with hacking into AT&T's website to steal e-mail addresses from about 120,000 iPad users got a boost last year when a confidential source handed over 150 pages of chat logs between the two and other members of their hacking group. Read More

Can the government prevent a DDoS attack?
On Dec. 8, 2010 a group of hackers launched distributed denial-of-service (DDoS) attacks against the Visa and Paypal Web servers and also on a Swedish Government Web site. The attacks were successful and the services offered by all these sites were severely disrupted. If major corporations, which operate in a multi-national environment, couldn't prevent these attacks, can the UK government stop such an attack on one of their Web services? Read More


WHITE PAPER: ParAccel

The Problem with Data Warehousing
Tackle the most complex analytic challenges and glean insight from vast amounts of data. Learn how a columnar-based, massively parallel processing analytic database can provide high performance analytics against complex SQL workloads the most challenging analytic queries. Read now!

The IETF at 25: Unfinished Business
The Internet we have today, and that most enterprises heavily depend on, is largely a result of IETF technologies, and more importantly, the IETF philosophy of the proper role of the network. The network that sprang from this philosophy is now under sustained attack and the future role of the IETF will depend on how well it responds to this attack. Read More

Details emerge of patents Novell is selling to Microsoft
Additional details have emerged regarding the more than 800 patents Novell is selling to the Microsoft-led consortium CPTN Holdings for US$450 million, about two months after the deal was first announced. Read More

Is the WWW poised to be a WMD?
OK. So that may be overstating the case just a little. Nevertheless, the well-placed worldwide attention that has been placed on the hate-speech that permeates the Internet (and other media) has us wondering whether the Internet is in some ways the 21st century equivalent of dual-edged sword that atomic power brought. Read More

HP-Microsoft collaboration bears fruit
Just over a year ago, HP and Microsoft announced a $250 million partnership to jointly develop HP appliances running Microsoft software platforms including Exchange, SharePoint and SQL Server. Today, some of the fruits of that collaboration are coming to market. Read More

230,000 suffer 'Call of Duty' collateral damage in data breach
A New Hampshire radiology center is blaming bandwidth-hungry Scandinavian gamers for a data breach that left exposed the personal information, including Social Security numbers, of some 230,000 individuals. Read More



BECOME AN INSIDER
Get premium content, in-depth reviews, practical tips and exclusive research. All for just signing up. Sign up for free today.

SLIDESHOWS

12 geekiest snow and ice sculptures
Not all tech weenies hunker down indoors when the snow starts piling up and the ice coats the streets. Some put on their mittens and boots and go to work creating fantastic snow and ice sculptures celebrating their tech favorites.

2011's 25 Geekiest 25th Anniversaries
Our fifth annual collection of the year's "geekiest anniversaries" kicks off with The Mentor's "Hacker's Manifesto" and includes such memorable characters as Captain Midnight and Ferris Bueller, institutions the likes of the IETF and Spy magazine, and inventions like the Super Soaker and disposable camera.

MOST-READ STORIES

  1. Facebook photos: Opt-out or tag you're it
  2. Will electronic toll system become terrorist targets?
  3. The 10 biggest hoaxes in Wikipedia's first 10 years
  4. "Stealing Wi-Fi" isn't about Wi-Fi
  5. Apple's Jobs takes medical leave
  6. Israel tested Stuxnet worm, says report
  7. Gartner's Magic Quadrant disses Amazon cloud
  8. IBM will not be a networking company
  9. 15 crazy Japanese tech gizmos
  10. Facebook, Google, Yahoo commit to 'World IPv6 Day' trial

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: