Monday, February 22, 2010

Beware the rogue Wi-Fi access in Windows 7; 15 Internet annoyances, and how to fix them

15 Internet Annoyances, and How to Fix Them | Cisco-HP split may not be too painful for customers

Network World Daily News AM Alert

Forward this to a Friend >>>


Beware the rogue Wi-Fi access point in Windows 7
The consumerization of IT is alive, well and causing all sorts of enterprise security challenges in the mobile arena. But highly visible issues, such as the consumer-centric Apple iPhone, represent only the tip of the vulnerability iceberg. Microsoft Windows 7, for example, contains software that allows a user's laptop to do double-duty as a rogue Wi-Fi access point that masks the entry of unauthorized users onto the corporate network. Read More


WHITE PAPER: Citrix Systems

Supercharge Your End Users with Desktop Virtualization
The Univ. of Texas Medical Branch unearthed a hidden benefit of desktop virtualization, namely a speedy recovery after a calamitous hurricane strike. This IDG eZine explores this and many other user benefits of desktop virtualization. Learn More Now

WHITE PAPER: BeyondTrust

Building a Secure and Compliant Windows Desktop
While removing administrator rights from end users may be the Holy Grail of desktop security, doing so can have an impact on what end users need to do their jobs. Read this white paper to discover powerful strategies to effectively remove administrator rights and improve desktop security. Read Now

15 Internet Annoyances, and How to Fix Them
The Internet's a wonderful thing, but it can also be a royal pain. Fortunately, there's help. Read More

Cisco-HP split may not be too painful for customers
Cisco Systems and Hewlett-Packard probably won't force their mutual customers to take sides after the end of their partnership, though the vendors are deadly serious about competing against one another, analysts said on Friday. Read More


WHITE PAPER: Ultrium

Cost Effective Data Security with Tape
With a growing number of laws and regulations, financial penalties, and public notification costs, a security breach can be costly for corporations. Data managers are called upon to develop effective security for sensitive data and are turning to tape encryption. Read Now

Chuck Norris botnet karate-chops routers hard
If you haven't changed the default password on your home router, you may be in for an unwanted visit from Chuck Norris -- the Chuck Norris botnet, that is. Read More

10 strategic security initiatives for every organization
SpiderLabs, the advanced security team within the consulting firm TrustWave, has just released its Global Security Report of 2010. The report is based on 200 forensic analyses and 1900 penetration tests conducted by in the past year. Nicholas Percoco of SpiderLabs shares his top 10 security initiatives that every organization should undertake in order to reduce the risk of a costly security breach. Read More


WEBCAST: HP

Improve Tracking of VM Devices
Virtualization has a major impact on the network and those who manage it, making it difficult to gain visibility to inter-VM traffic. This Webcast addresses the challenges – from operating expenses and compliance to security and management. Learn best practices to alleviate some of the burden virtualization has placed on the network. Listen now

Chinese schools deny role in Google hack
Two schools in China where computers were reportedly linked to cyberattacks on Google and other companies have denied involvement in the hack, Chinese state media said Sunday. Read More

Benefits of the FCC Broadband Plan
The FCC revealed a preview of the National Broadband Plan it intends to propose to Congress next month. The 56-page proposal outlines some ambitious, yet reasonable, initiatives aimed at expanding and modernizing access to broadband in the United States. Read More

Dreaming Up the Smartphone of the Future
When Google unveiled the Nexus One in early January, it somewhat arrogantly attempted to separate the phone from its competitors by calling it a "superphone." In the weeks since the Nexus One launch, we've seen users complain about spotty data network reception and non-existent customer service which made the Superphone experience feel disappointingly mediocre. Read More

Report: Jobs calls Flash 'CPU hog'
Apple's Steve Jobs has reportedly called Adobe's Flash video technology a "CPU hog" during a meeting with The Wall Street Journal, claiming the iPad would have a battery life of just 1.5 hours with Flash installed. Read More



Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

Forrester Research and Network World want to hear from you!
We are collaborating to conduct an on-line-based study focused around data center strategy. The survey should take approximately 12 to 15 minutes to complete. This is both a confidential and anonymous survey and your results will only be used in aggregate. As a special thankyou, all respondents will receive a free copy of the resulting research report from Forrester – a $500 value! Thank you for taking the time to fill out the survey.

Today from the Subnet communities

Massive giveaway from Cisco Subnet: 50 copies of the Cisco Press CCNP Cert Kits kits are up for grabs. Deadline March 31. 15 books on Microsoft PerformancePoint business analytics available, too.

SLIDESHOWS

Videogame your way through the Olympics
If you're bored with (or inspired by) NBC's coverage of the games, there's always your PC or video game system that lets you feel like you're competing in these events.

The technology behind the Vancouver Olympic Games
Bell Canada is claiming the Vancouver 2010 Olympic network as the first IP-based converged network at any Olympic or Paralympic Games. It will be built to provide seamless telephone, wireless, radio and Internet communications services for fans, media, athletes and officials from around the world.

MOST-READ STORIES

  1. Botnet revelation shows darker underbelly of malware
  2. Cisco drops HP as certified reseller, service partner
  3. FAQ: The Kneber botnet revealed
  4. 10 warning signs your IT career is in trouble
  5. The 10 coolest experiments from Google Labs
  6. Rootkit to blame for Windows crashes after patch is installed
  7. Kneber just another botnet?
  8. Facebook now second most popular site on Web, beating out Yahoo
  9. Moscow billboard porn hacker busted
  10. To build a better bobsled

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment