Thursday, February 17, 2011

7 ways to avoid getting hacked by Anonymous

Survey: When IT professionals cheat | Cisco grapples with transition as routers and switches lag

Network World Daily News PM

Forward this to a Friend >>>


7 ways to avoid getting hacked by Anonymous
The hactivist group Anonymous used a series of simple technical and social exploits to crack the network of security-technology firm HBGary Federal, giving the company a schooling that other network security pros can learn from. Read More


WHITE PAPER: Diskeeper

Maximize SAN Infrastructure Performance
Although SAN has advantages in performance, reliability, availability and provisioning, it is affected by fragmentation and performance will decline unless it is addressed. Find out why this is true and how to best avoid SAN slowdowns. Read more

WHITE PAPER: Eaton Corporation

Maximizing UPS Availability
This white paper explains why, contrary to popular belief, modular UPS designs provide superior availability even though they typically contain more parts that could potentially fail. Read now!

Survey: When IT professionals cheat
We asked 200 IT professionals to tell us how often IT workers cheat on certification exams, buy fake gear or illegally share software. Read More

Cisco grapples with transition as routers and switches lag
Cisco is in the throes of a companywide transition away from the switches and routers that form the bedrock of its business toward new markets to fuel future growth -- and the shift is affecting Cisco's revenue. Read More

Microsoft to WP7 app developers: Use our open source licenses
Microsoft has prohibited developers from using GPLv3-licensed open source software in any application distributed on the Windows Phone Marketplace. But Redmond is pushing mobile application developers to use packages based on an open source license created by Microsoft. Read More


WHITE PAPER: LogMeIn

Take Remote Management to a New Level
Lentner Technology provides managed IT services to legal, medical, and manufacturing firms in South Eastern Connecticut, and has been relying on LogMeIn products since the company was founded in 2003. Find out why. Read now

Bulk of browsers found to be at risk of attack
About eight out of every 10 Web browsers run by consumers are vulnerable to attack by exploits of already-patched bugs, says a security expert. Read More

Hot products from RSA 2011
Security conference showcases the next trends in network security. Read More

U.S. patients trust docs, but not e-health records, survey shows
Patients in the U.S. trust their doctors, but not the electronic health records those doctors are now implementing, according to a soon-to-be-released study from CDW Healthcare. Read More


WHITE PAPER: St. Bernard Software

Compare Web Filters, Enter to win an iPad
View this demo of iPrism Web Filter and learn why throughput speeds of up to 100+ Mbps, anti-virus protection, and seamless Active Directory/Terminal Services integration and reporting included at no charge has made iPrism the appliance-based choice for organizations of all sizes. Learn More

Microsoft Security chief pleads for "collective defense" of the Internet
At RSA, Microsoft's Scott Charney chief laments Commerce Dept. protection plan dismissed as 'government ID'Scott Charney, corporate vice president for Microsoft's Trustworthy Computing initiative, today promoted the idea of a "collective defense" of the Internet at the RSA Conference 2011 going on in San Francisco. In his keynote, he said collective defenses include a combination of security measures by both individuals, corporations, Internet service providers and, yes, government. Yet such government... Read More

Impact of Server Virtualization on Future IT Management Strategies
Few users—regardless of technology segment—believe that virtualization will have little or no impact on their infrastructure management processes and toolsESG research respondents across five IT disciplines exhibit a desire for more effective management tools. In order to explore this topic in more detail, respondents with knowledge of their organization's server, storage, and/or networking operations were also asked about the impact of server virtualization on their functional technology management processes and tools (see below graphic).  Read... Read More

Apple's Steve Jobs, Facebook's Mark Zuckerberg, Google's Eric Schmidt set to talk tech with Obama
President Barack Obama reportedly will meet with Apple CEO Steve Jobs, Facebook CEO Mark Zuckerberg, Google Executive Chairman Eric Schmidt and possibly other business leaders in "technology and innovation" in San Francisco Thursday night. Read More

Hatch wants White House to seek H-1B expansion
U.S. Sen. Orrin Hatch (R-Utah) berated the White House on Wednesday for failing to urge expansion of the H-1B program. Read More

X Prize $30 million private race to the moon is on
X Prize gets 29 teams to compete for $30 million in prizes to get to moonThe master competition masters at X Prize Foundation are at it again.  Today the group announced the 29 international teams that will compete for the $30 million Google Lunar X Prize, the competition to Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a Windows 7 Enterprise Technician class for three people. From Cisco Subnet: 15 copies of AAA Identity Management Security. Enter here.

SLIDESHOWS

15 more useful Cisco sites
Three years ago, we compiled our initial list of 20 useful sites for Cisco practitioners, partisans and pundits. Now we're adding to that list with 15 more sites we found useful for the Cisco masses.

A sneak-peek preview of Android 3.0
Expect a new holographic look, customizable home screens, a Windows-style taskbar, and tabbed browsing in Google's upcoming version of the Android OS, code-named Honeycomb.

MOST-READ STORIES

  1. How IT pros cheat on certification exams
  2. Microsoft IE9 not a 'modern browser,' Mozilla exec claims
  3. Banshee Amazon Store disabled in Ubuntu 11.04 by Canonical
  4. Jennings explains his Jeopardy loss to Watson
  5. Stolen HBGary e-mails indicate plans for a "new breed of rootkit"
  6. Geekiest marriage proposals of all time
  7. Full-duplex radio breakthrough can double Wi-Fi capacity
  8. iPad productivity tools: 3 must-haves
  9. Top 12 Google Labs experiments
  10. Tablets, smartphones force Cisco to rethink how security works

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment