Thursday, August 26, 2010

Microsoft's big Bing theory targets Google; Windows DLL exploits boom

  Windows DLL exploits boom; hackers post attacks for 40-plus apps | Microsoft binary planting bug: What you need to know
 
  Network World Microsoft

Forward this to a Friend >>>


Microsoft's big Bing theory targets Google
It's time to wait and see whether the search alliance between Microsoft and Yahoo can make a dent in Google's huge lead over its top opponents. Read More


WHITE PAPER: NetApp

Benefits of Windows Storage and Servers Consolidation
In this article hear from Keith Alioto, IT Director at Osiris Therapeutics discuss the evolution of their infrastructure and describe where they are now and where they're headed. He'll also talk about why they made the decisions they have and the importance of choosing the right partners. Read More

WHITE PAPER: Red Hat

Planning Guide: SAP to Red Hat Migration
Lower costs and improve performance migrating SAP to Red Hat Enterprise Linux. Download this guide today and discover how you can perform a basic installation and migration in less than 1 day. Examine pre- and post-migration considerations and other upfront planning topics to help avoid potential problems. Read more

Windows DLL exploits boom; hackers post attacks for 40-plus apps
Some of the world's most popular Windows programs are vulnerable to a major bug in how they load critical code libraries, according to sites tracking attack code. Read More

Microsoft binary planting bug: What you need to know
Microsoft released a security advisory in response to a potential exploit, known as DLL preloading or binary planting, which has been found to impact hundreds of third-party Windows applications -- possibly including software developed by Microsoft itself. Unfortunately, this isn't a simple Windows vulnerability that Microsoft can fix with its next patch release, so it's important that you understand the flaw and what is at risk, as well as what you can do to protect your systems. Read More

Windows and Linux servers grow at Unix's expense
Demand for Windows and Linux servers is increasing at a rapid pace, at the expense of Unix servers and other non-x86 machines, according to IDC. Read More


WHITE PAPER: Shoretel

Simplify System Management
Telephone system manageability depends to a great extent on the underlying architecture of the voice system. The architectural approach for integrating new systems has serious implications for management. In this paper you will learn more about how various architectural approaches impacts overall system manageability. Read now!

Microsoft leaks IE9 look, reveals 'Chromifying'
Microsoft's Russian Web site today revealed details about the new Internet Explorer 9 user interface, touting new features such as quick-release tabs and a Chrome-like address/search bar. Read More

Facebook to pull IE6 plug for Chat
Facebook today announced that chat support for Microsoft's IE6 browser will be dropped on Sept. 15. Read More

Microsoft overhauls Outlook Web Access in Exchange 2010 SP1
Exchange 2010 Service Pack 1 is now ready for all customers to download, Microsoft announced Wednesday. Read More


WHITE PAPER: Xerox

Cutting through complexity at Reuters
Reuters, the world's largest news agency, implemented managed print services that reduced the total cost of their printer fleet by up to 19% per year while increasing user satisfaction and productivity. Read Now.

Microsoft clarifies 'phone-to-console'
Reports surfaced yesterday from a Microsoft press event in Toronto, Canada, claiming that the upcoming Windows 7 phone would be able to play games with an Xbox 360 player in real time in the "near future." Turns out, it's not exactly on the top of Microsoft's to-do list. Read More

Microsoft: Looking for love in all the wrong places
Headlines and bylines all over the web have trumpeted the fact that Microsoft loves open source. Regular readers of my blog (OK you two, you can sit back down) know that I have been saying this for a long time. Yes it is a gentler and kinder Microsoft when it comes to open source and even Linux interoperability. But the real question is will the open source community ever love Microsoft back? Read More

RIP, Yahoo Search: Why I'm not shedding a tear
It's official: Yahoo's search results in the U.S. and Canada are now fully powered by Microsoft's Bing. The announcement came on Tuesday, a little more than a year after the two tech powerhouses agreed to combine search forces in order to compete with Google. And while many are lamenting the passing of Yahoo Search, one of the Internet's true originals, I'm not among them. Here are three reasons why I think Yahoo Search had to go. Read More

Microsoft can only do so much to fight cyber threats
That headline was not written to make me sound like an apologist for Microsoft. A lot of the security breaches happen because people with bad intentions exploited weaknesses in ubiquitous Windows operating systems in computers worldwide. Try as they might, Microsoft and other software companies still need to diligently patch security leaks in the virtual world. But there is also a need for security in the physical world. Read More

Data mashups, hundreds of million rows in Excel 2010 using PowerPivot
Excel 2010 introduces slicers, sparklines, the AGGREGATE function, the Equation Editor and a smoother way to paste, but by far, the best feature in Excel 2010 did not come from the Excel team. Read More

 
 
 

Join us on LinkedIn

Discuss the networking issues of the day with your colleagues, via Network World's LinkedIn group. Join today!
- Jeff Caruso, Executive Online Editor

SLIDESHOWS

Cloud storage lives up to the hype
We tested five cloud-based storage services under real-world conditions. We set up accounts, connected with the vendor storage network, uploaded and downloaded files, measured performance and analyzed cost structures. Our conclusions are that cloud-based storage can save you money. And cloud-based storage can be fast. However, there are still security concerns that you need to be aware of.

Wireless networks and mobility quiz
iPhones and other handhelds bought for home use are infiltrating corporate networks, but there's a host of other wireless technologies that comprise a wave of mobile computing that is creating sweeping changes in business infrastructure. How well versed are you in the technical and not-so- technical details?

MOST-READ STORIES

  1. Zero-day Windows bug problem worse than first thought
  2. Linux community finally fixes 6-year-old critical bug
  3. Intel-McAfee deal baffles security analysts
  4. Android 2.2: How to install Flash on Froyo
  5. Intel buys McAfee: My two cents
  6. Microsoft won't showcase Hyper-V at VMworld
  7. Cameron Diaz could wreck your PC, McAfee warns
  8. Decorate with Linux
  9. Intel to buy McAfee in $7.68 billion blockbuster
  10. Does Intel buying McAfee have any impact on open source
 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_microsoft_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2010 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments:

Post a Comment