Search This Blog

Tuesday, August 02, 2011

Windows XP is a rootkit spawning pool

Internet Explorer gains among Windows 7 users, despite Microsoft's overall losses | Thinking about RISC with Windows 8

Network World Microsoft

Forward this to a Friend >>>


Windows XP is a rootkit spawning pool
If you're still dragging your feet on moving to Windows 7, consider this: A report from the Czeck antivirus firm Avast notes that three in four PCs infected with rootkits are running Windows XP, and it's not because so many people use aging operating system. Read More


WHITE PAPER: Splunk

Financial Services Firm Reduces Mean Time to Recovery
Literally every second counts, when downtime costs in the tens of thousands of dollars per minute. Learn why one U.S. financial services firm turned to Splunk and implemented a system that provides one global view of multiple logs to dramatically reduce their MTTR and paid for itself in just one month. Read more.

WHITE PAPER: GFI Software

Email Security in Small and Medium-sized Businesses
No organization can afford to operate without an email security strategy. The risk landscape is constantly changing with new threats surfacing every day. This white paper looks at email security in small and medium businesses, the solutions available and what features SMBs cannot do without. Read now

Internet Explorer gains among Windows 7 users, despite Microsoft's overall losses
Microsoft's long and steady decline in browser market share continued in July, but there is one bright spot for Redmond: Among Windows 7 PC owners, Internet Explorer is gaining, albeit only slightly. Read More

Thinking about RISC with Windows 8
As Microsoft expands the CPU platform support from x86/x64 families into ARM territory with the addition of ARM CPU chips, there are many questions that will be raised for enterprise systems planners and designers. Some of the arguments will go back two decades in terms of the theoretical design differences between CPUs, but in more practical views, the actual impact of two CPU device families supported by Windows needs to be thought through. In the short term, nothing needs to be done; in the long term, deeper questions arise. Read More

From the department of kicking Google while it's down
"Well, sometimes when a person loves their gmail very, very much, the two get together and an ad is born." And with that quote, Microsoft hurls a big, fat grenade at Google for its contextual ads in Gmail. Read More


WHITE PAPER: Extreme Networks

Identity-Aware Networking
Download this whitepaper today discover how IT can integrate identity and networking, enabling new business processes and easing regulatory compliance while improving security. Read now!

Microsoft MDOP now controls BitLocker
Microsoft has expanded its Microsoft Desktop Optimization Pack (MDOP) to include the ability to manage users' BitLocker encrypted folders. Read More

Doing e-discovery/message retention/legal recovery in Exchange 2010-Office 365
The topic has come up many times recently on how organizations can leverage Microsoft Exchange 2010 (on-premise) or Microsoft Office 365 (in the cloud) to retain messages, legally hold and recover messages, and successfully perform eDiscovery tasks as required by legal counsel, by law, and/or as needed. Read More

ACLU to Congress: Cancer of gov't secrecy is killing America
American democracy is beyond sick, in fact it's cancerous due to government secrecy cloaking the surveillance of American citizens. According to a new ACLU report, written by Mike German, a former FBI undercover agent, and Jay Stanley, "We are now living in an age of government secrecy run amok." Read More


WHITE PAPER: Aerohive

Get Wi-Fi Ready as a LAN Replacement
As Wi-Fi continues to evolve, administrators need better real-time visibility into the "health" of clients. Learn how one tool can provide an intuitive, "at-a-glance" picture of: - Client transmission data rates - Transmission success rates - Goals of deployment for high, normal and low density locations Read now!

Opalis runbook automation fundamentals (Part 1)
As one speaks to customers about System Center these days, Opalis Integration Server (OIS) is a product that everyone wants to know more about. To that end, this series of postings covers some fundamental concepts to help get you started. This 3-part blog series discusses OIS 6.3 concepts and functionality, including real-world tips and sample automation sequences (policies) to jumpstart your process automation efforts. Read More

Google explains its data correlation privacy settings
In response to my blog post about how Google seems to be gathering pubic data about people and correlating it with their Google user names, Google has offered some explanations. A company spokesperson told me that the search giant is no looking at public phone directories to match phone numbers with user names. But it is looking through social media sites to correlate those accounts to your Google user name and profile. Read More

Microsoft fixes Mac Office bug in Apple's Lion
Microsoft released an updated version of Communicator for the Mac that works with Apple's Lion operating system. Read More

Latest Windows Phone 7 tools let coders ready Mango apps
Microsoft has released the latest beta version of the Windows Phone 7 Mango development tools and OS build to developers. They can now start final preparations for submitting the first batch of Mango apps for certification in August. Carriers and handset makers are already testing near-final code for new phones due this fall. Read More

Alcatel-Lucent gets $70 million in Microsoft patent case
Microsoft has been ordered to pay $70 million to networking vendor Alcatel-Lucent in a years-old patent dispute that at one time could have cost Microsoft $1.5 billion. Read More



GOODIES FROM MICROSOFT SUBNET
We've got books on System Center Opalis Integration Server and Microsoft training of the winner's choice from Webucator.. Enter here.

SLIDESHOWS

The Geekiest iPad Apps Ever
We scoured the App Store to find the "geekiest" apps out there for the true purveyor of all things geek.

MOST-READ STORIES

  1. 10 technologies that will change the world in the next 10 years
  2. 'War texting' lets hackers unlock car doors via SMS
  3. iPhone 5 rumor roll-up for the week ending July 29
  4. Why I was banned on Google+ (and how I redeemed myself)
  5. E-commerce sites based on open source code under attack
  6. Say what? GNU Emacs violate the GPL
  7. How to survive Black Hat and Defcon without getting hacked
  8. Black Hat roundup: Let the electric-shock craziness begin
  9. Happy SysAdmin Day. Are you feeling thankful?
  10. New cases suggest iPhone 5 will be thinner, wider and longer than iPhone 4

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: