Monday, August 24, 2009

More tips on detecting botnet infestation

Obsolete technology: 40 big losers; Truth About the H-1B and L-1 Visa Reform Act of 2009
Network World logo

IT Best Practices

NetworkWorld.com | Update Your Profile


Sponsored by HP
rule

IDC: Realizing the Benefits of Deduplication
Many organizations are grappling with rapidly growing storage requirements. IDC has found that those organizations are experiencing 50% growth in data, adding as much as 4TB of data each year. Read this whitepaper on dynamic deduplication to understand cost effective solutions to exploding storage.

Learn more.

rule

Spotlight Story
More tips on detecting botnet infestation

As a follow-up to last week's article on detecting the presence of a botnet on your network, I have more advice from experts in this arena. IBM's Internet Security Systems X-Force gives specific examples of botnet activity to watch for on your network. Read full story

Related News:

Obsolete technology: 40 big losers
By the time you read this story, the Internet may be obsolete. Okay, maybe not. But you never know. We've compiled a list of 40 once-commonplace activities that are rapidly approaching extinction.

Truth About the H-1B and L-1 Visa Reform Act of 2009
Since the H-1B and L-1 Visa Reform Act of 2009 was introduced in Congress this spring, business and political leaders on both sides of the non-immigrant visa issue have interpreted the bill to support their respective causes. Thus, the proposed legislation is either a cure to the job losses and salary declines afflicting American IT workers, or it's a work of overzealous xenophobia destined to do irreparable harm to U.S. global business relations, depending on who is providing the analysis.

The 10 Stupidest Tech Company Blunders
Some of the biggest high-tech deals never happened. Some of the most promising products and services never came to be. Why? Because the people and companies involved didn't realize what they were letting slip through their fingers, or they simply couldn't foresee what would happen afterward.

5 recession-era strategies for software vendors (and their customers)
Clamping down on pirates, simplifying licenses and boosting layoffs and outsourcing are among the recommendations that Accenture Ltd. has for software vendors struggling in this economy.

8 Dirty Secrets of the IT Security Industry
Joshua Corman would seem an unlikely critic of IT security vendors. After all, he works for one. Yet Corman, principal security strategist for IBM's Internet Security Systems division, is speaking out about what he sees as eight trends undermining the ability of IT security practitioners to mount an effective defense against online outlaws.

How to Prevent a Heartland-Style Data Breach
The United States Department of Justice announced today the arrest of Albert Gonzalez, a 28-year old Miami man, in the largest identity theft prosecution on record. Gonzalez is accused, along with two as-yet-unnamed Russian co-conspirators, of compromising more than 130 million credit and debit card accounts from a variety of targets including Heartland Payment Systems and 7-Eleven.

August Giveaways
Cisco Subnet is giving away training from Global Knowledge and 15 copies of Practical Intrusion Analysis; Microsoft Subnet is giving away training from Global Knowledge and 15 copies of SCCM 2007 Unleashed. Google Subnet is giving away 15 copies of Web Geek's Guide to Google Chrome. Entry forms can be found on the Cisco Subnet, Microsoft Subnet and Google Subnet home pages. Deadline for entries is August 31.

Network World on Twitter? You bet we are


10 sports technologies to love, 5 to hate
Sports technologiesMany technologies help fans enjoy sports. Others just annoy.

Apple disasters
Apple disastersApple has enjoyed huge success with the iPod and iPhone, but Apple has had a number of commercial flops, too.

A Clear View Toward Virtualization
Virtualization has busted out of the data center and overspread the desktop and application worlds. Citrix has emerged as a major innovator in virtualization solutions. Download this Executive Viewpoint featuring Citrix CEO Mark Templeton.
Click here.


Unifying Management Systems for Deep Savings
To deliver the availability and performance the business demands, network management teams need to optimize fault management, unify fault and performance management, automate change and configuration management, implement run-book automation, and deploy a configuration management system based on a federated CMDB. This integrated approach is called automated network lifecycle management and is outlined in this white paper.
Read Now

 

August 24, 2009

TOP STORIES | MOST DUGG STORIES

  1. How to build a 100,000-port Ethernet switch
  2. Windows 7 RC downloads end Thursday
  3. The 10 stupidest tech company blunders
  4. Apple disasters
  5. Account password reset procedures a joke
  6. Windows WINS attacks in the wild
  7. When Apple flops: The worst products of all time
  8. DNS 'blacklist' unveiled
  9. Port 666
  10. FAQ: How to get Windows 7 on the cheap

Optimizing IT Budgets In tight Economic Times
Download this whitepaper and learn how one $5,000-10,000 server can manage 250,000 endpoints reducing the number of consoles and Full-Time Employees (FTEs) to manage them.
Learn More



IT Buyers guide

 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments:

Post a Comment