Monday, November 23, 2009

Internet = InterNOT at Interop; How Nikto saved my tail; 6 greatest threats to US network security

How Nikto saved my tail on a cold Wisconsin morning; The six greatest threats to US network security
Network World logo

Voices of Networking

NetworkWorld.com | Update Your Profile | Forward this to a Friend >>>


Sponsored by Zyrion
rule

Improve Data Center Monitoring and Management with BSM and ITIL
Older generation monitoring products are not able to unify fault/event, performance management and BSM all within one system. This gap forces IT to deploy and integrate multiple systems in order to get an end-to-end view. Read this white paper to learn about a streamlined approach that goes beyond measuring the technical performance of servers and network nodes and provides real-time visibility into the business impact of specific service problems.

Learn more!

rule

Spotlight Story
Internet = InterNOT @ Interop

I was in New York for a one-day whirlwind tour of the Interop show floor. Little did I know that I would be forced to live the day as one of the unfortunate - the "have-nots" - the "Internet unconnecteds." Read full story

Related News:

How Nikto saved my tail on a cold Wisconsin morning
So I say, "If you can break into my server and capture my flag, I will send you out a Wisconsin Kringle from O&H Bakery and I will wear a dress on the next episode of TechWiseTV." Yeah, that's right. I am moron.

The six greatest threats to US network security
It's not a very good day when a security report concludes: Disruptive cyber activities expected to become the norm in future political and military conflicts.

How Come We Don't Have a Standard Handset Architecture?
Why, I ask, don't we have a standard hardware definition for a cellular handset, along the lines of the PC?

Interoperability: The Next Great Frontier for Telepresence.
Video conference users have for the most part been free of the hassles of trying to figure out how to interoperate products from different vendors, thanks to early and widespread adoption of H.323 signaling protocols and H.261 and H.264 video encapsulation, both sets of protocols well defined by the ITU.

Federal data breach highlights difficulties of data security
The feds went out of their way to define a Windows configuration that was "secure by default," yet a Junior staffer was able to either access a confidential file from an insecure computer or install peer-to-peer software on an FDCC-compliant system.

Steve Jobs is a man of a few words
When The Little App Factory received a legal letter from Apple requesting that they change the name of their popular Mac app, "iPodRip", CEO John Devor decided to pen a heartfelt email to Apple CEO Steve Jobs himself.

Check every day? Geesh, the identity thieves have won
With Cyber Monday approaching, we here in the news business are being inundated as usual with offers of "expert advice" for us to pass along to readers/online shoppers so that they may better protect themselves against identity theft.Most of it we -- and you -- have read a hundred times already.

Android Needs Google For Now
Android is a free and open platform. Device manufacturers can take the platform and put it on their own devices. Software developers can write applications for Android without concern about being blocked from publishing as they can always choose to self-distribute their applications. However, this freedom comes as a price.

London Olympic project could redefine cloud computing
Cloud computing is one of those phrases with a fuzzy definition – but there's a new cloud potentially being built in London that makes all previous ones seem staid and boring.

November giveaways
Cisco Subnet is giving away free books on VMware vSphere security. Microsoft Subnet is giving away training from New Horizons and free books on Exchange Server 2010. Google Subnet is giving away free books on Android app development. Entry forms can be found on the main contest page. Trivia answers are revealed on each main Subnet page.

Network World on Twitter? You bet we are


Ethernet everywhere!
Ethernet everywhereInside planes, trains, cars and spaceships, Ethernet is a morph master. Here's a look at some of Ethernet's cooler implementations.

7 tools to ease Windows 7 rollout
Windows 7These utilities help you plan, ensure app compatibility and manage images.

Secure in 15 - Start with Daily Practices
Get the Secure in 15 toolkit starting with the "15 Minutes Month-at-a-Glance" calendar. McAfee will send you additional tools and tricks to stay protected around the clock.
Click here to learn more.


3 Tips to Get Out of Firefighting Mode
Join Enterprise Management Associates (EMA) for this webcast on how to become more proactive with network and application management. EMA offers guidance on how to pick a pilot project to demonstrate immediate success as well as tips on how to lengthen MTBF and shorten MTTR.
Click here to get all the details now!

 

November 23, 2009

MOST-READ STORIES

  1. New attack fells Internet Explorer
  2. Steve Jobs is a man of a few words
  3. Oddball gifts for uber geeks
  4. Global warming research exposed after hack
  5. Google adding IPv6 to YouTube
  6. The 5 best, and 5 worst, features of Google Chrome OS
  7. Cisco's free iPhone apps grabs security feeds
  8. Microsoft Windows chief decries standards grandstanding
  9. Federal government using PS3 to crack pedophile passwords
  10. Top 10 free Windows tools for IT pros, at a glance

Unifying Management Systems for Deep Savings
Integrating fault, performance and configuration management into a single unified database is a powerful, cost saving proposition for all IT shops. Learn more now.
Download now!



EMO Labs: Better Sound Through Innovation at DEMOfall 09

EMO Labs' Invisible Speaker innovation takes People's Choice Award top honors at DEMO conference.
Watch EMO Labs product launch.


 


This email was sent to security.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues of Network World Magazines, in print or electronic format, free of charge. Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com | Forward this to a Friend >>>

 

 



No comments:

Post a Comment