Friday, March 30, 2012

10 fun (and safe) ways to pretend to be a hacker

AOL unplugs 10,000 servers, saves $5 million | Threat of a bullet in the face keeping cybercrooks cautious

Network World Daily News AM

Forward this to a Friend >>>


10 fun (and safe) ways to pretend to be a hacker
Enjoy hacking, Hollywood-style, with these video games Read More


WEBCAST: HP, Microsoft & Intel

Appliance video
The first appliance in the industry which consolidates and manages thousands of databases, integrates hardware, software and support and is scalable to meet your changing business needs. Learn more

WHITE PAPER: Oracle

Oracle TimesTen In-Memory Database
This white paper describes configuration considerations, best practices and performance results of TimesTen running on Exalogic. Learn More!

AOL unplugs 10,000 servers, saves $5 million
AOL decommissioned almost 10,000 servers and saved itself US$5 million along the way to winning a contest that highlights the cost of running inefficient or underutilized IT equipment. Read More

Threat of a bullet in the face keeping cybercrooks cautious
Scott Borg, director of a cybersecurity research institute, kicked off the SecureWorld Expo Boston with an uplifting talk about the end of the cybersecurity world as we know it. Sure, more sophisticated threats are on the way, but those in cybersecurity also have new opportunities to defend threats and even enable economic growth. Read More

Fake 'The Roar of the Pharaoh' Android app latest Trojan scam
It may look like an app for a Chinese game called "The Roar of the Pharaoh," but it's actually just another fake Android app that's really a malware Trojan in disguise, according to security researchers warning about it today. Read More


WHITE PAPER: IBM

Shorten The Gap Between Customers and Development Value
It's a fine line to walk—trying to balance between the costs and the benefits of procuring development and test IT assets. Read this white paper to learn about the challenges that CIOs, IT managers and application development managers face as they attempt to select a cloud computing vendor to help find the right path. Learn More

Researchers smash Kelihos botnet with dose of its own poison
Security researchers from four different organizations last week brought down a botnet by turning a supposed strength of the criminals' spamming network into a fatal weakness. Read More

IT jobs will grow 22% through 2020, says U.S.
U.S. officials Thursday said that offshoring will hurt the growth of programming jobs in in this decade, though expansion of health care IT and mobile networks will increase demand for software developers, technical support and system analysts. Read More

Amazon posts human genetic details of 1,700 people
Amazon Web Services today announced that genomic information of 1,700 individuals has been placed in its public cloud and can be accessed by anyone in the world. Read More


WHITE PAPER: BMC

Workload Automation Challenges and Opportunities
This Executive Brief discusses IDC's perspective on how enterprise workload management requirements are changing and highlights the ways that workload automation solutions can address these emerging requirements. Learn More!

Will RIM ever recover? Prognosis: Negative.
Well, it looks as though Research in Motion has now officially entered the "fire-everyone-and-hope-for-the-best" phase. Former co-CEO Jim Balsillie was the biggest head to roll today but he was hardly alone. Via Crackberry, here's the full scope of the carnage: Read More

Google to sell Android tablets online, report says
Google will open an online store where it will market and sell tablets directly to consumers, with some of the devices potentially being co-branded with Google's name, the Wall Street Journal reported Thursday. Read More

And now, the final nail in WiMAX's consumer handset coffin
Back in the heady days of 2008, Sprint had a dream: It was going to level the playing field with rivals Verizon and AT&T by being the first carrier to deploy mobile WiMAX and thus deliver the fastest mobile Internet experience in the country. Read More

How to Be Ready for Big Data
Big Data is coming, but for most organizations it's three-to-five years away. That doesn't mean you shouldn't prepare now. Analyzing Big Data will require reference information like that provided by a semantic data model. And once you mine the data, you need to secure it. Read More



SLIDESHOWS

20 iPad business apps every CIO should want
iPad apps for sales forces, IT departments and more.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. IETF attendees reengineer their hotel's Wi-Fi network
  2. New Google Account Activity lets you know what Google knows about you
  3. Cisco acquires home network management company
  4. Cloud services face taxing dilemma
  5. More fun with naming wireless nets
  6. Steve Jobs wasn't a fan of the Siri name
  7. International security team shoots down second Hlux/Kelihos botnet
  8. Firewall fail: A tale both funny and sad
  9. Critical milestones in Cisco history
  10. 7 password managers for Windows, Mac OS X, iOS, and Android

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment