(Go: >> BACK << -|- >> HOME <<)

Computerworld
Quick Menu
Search



Ads by TechWords

See your link here


Subscribe to our e-mail newsletters
For more info on a specific newsletter, click the title. Details will be displayed in a new window.
Networking Security
Networking
Computerworld Daily News (First Look and Wrap-Up)
Computerworld Blogs Newsletter
The Weekly Top 10
More E-Mail Newsletters 
Computerworld 2007Subscribe to Computerworld
40 years of the most authoritative source of news and information for IT leaders.
Identity Theft Protection
Total Protection from IDENTITY GUARD protects your identity

Cisco: Cyberattacks growing, looking more legit
Cyberattacks are becoming increasingly sophisticated as criminals continue to hone their approaches to stealing data from businesses, employees and consumers, according to a Cisco study released this week. Read more...

Microsoft sees 'huge increase' in IE attacks

Researcher: Chrome, Safari password managers need work

New G.hn ITU standard approved for home networks

Nortel Networks mulls bankruptcy

Vulnerabilities play only a minor role in malware spread, says researcher

Rival offers 50% discount to SonicWall users miffed by licensing glitch

Firefox users targeted by rare piece of malware

Networking glitch knocks Yahoo offline for some

Brocade reports record revenues for fourth quarter

More Network Security StoriesMore Top Stories

Register for sites without giving up contact info
BugMeNot stockpiles user-generated passwords and log-ins so you don't have to provide your own personal info. Here's how to install and use the BugMeNot extension. (Users of IE and other browsers can still tap the great service just by visiting the site.)

Opinion: The debate resumes over Mac security
The Mac community this week found itself debating an updated Apple Inc. Knowledge Base article that urged users to run antivirus software -- until the document was yanked. Computerworld's Michael DeAgonia breaks down the brouhaha down for you.

Economic crisis threatens networking growth
The networking industry is facing, along with the rest of the economy, a major financial crisis, writes Thomas Nolle. Our generation has taken network growth for granted and has seen the Internet reshape culture. This comfortable view that 'more bits' will pave the way to the future is the greatest threat we face, he says, because networking is going to change, one way or another.

How spyware nearly sent a teacher to prison
If there's a poster child for the dangers of spyware, it's Julie Amero, who was convicted of four felony charges after a classroom computer began showing inappropriate content in pop-ups when she was working as a substitute teacher.

Convergence, not economy, driving managed LAN services
There was a time when the decision to manage LANs in-house was a no-brainer. LANs by definition cover a small area and have traditionally been simple operations to run and maintain.

Seven Lessons That SMBs Can Learn from Big IT
Just because you don't have a large enterprise doesn't mean you can't run your IT operation like the big guys. Using these tips, you should be able to improve productivity, cut costs and keep your business running smoothly.

Mafiaboy grows up: A hacker seeks redemption
Notorious for knocking offline sites such as Yahoo, Amazon, Dell and CNN at the age of 15, the former hacker Michael Calce has served his time and is working as a legitimate security consultant while publicizing a tell-all book about his exploits.

Eight crazy e-mail hoaxes millions have fallen for
They're far-fetched, too good to be true, irrational, ridiculous or impossible, but people still keep clicking on these e-mail hoaxes -- and losing money, compromising their security or just feeling stupid.

Network Access Control: Deploy now or wait?
It's far from a perfect technology. Not only is NAC still maturing, but there are also several competing factions and little in the way of industry standards, leading some to wonder if it might make sense to wait.

15 great, free privacy downloads
These firewalls, password protectors, rootkit killers, trace cleaners, anonymity securers and other apps help you enjoy a safer online experience.

You can get lean and fast computing with your current version of Mac OS X. Here's how.
Some technology executives don't simply defy convention; they craft a whole new definition of leadership. Learn how the Premier 100 class of 2009 is blazing new management trails.
Apple's new display is more than a gorgeous 24-in. monitor; it's a de facto docking station.
We've got an array of economical, expensive, and just plain weird tech gifts for your friends and family.
Get the latest news, reviews and more about Microsoft's newest desktop operating system
Find wage data for 50 IT job titles.
Securing and Managing the Endpoints: The Case for Convergence
(Source: Symantec) To achieve best-in-class results, convergence of security, compliance and cost-effective management of endpoint systems is vital but not a means to an end. If your current levels of investment in security and compliance have gotten out of balance, taxing your IT resources and effectively your organizations ability to deliver new products and services, then you need to read this white paper.
More White Papers More White Papers
E-mail Address:
(Required)
 Networking
 Networking Security
 Wireless Networking
 Networking Hardware & Devices
"What started as rain last Thursday quickly turned into the worst ice storm in New Hampshire history. The Monadnock Region..." Read more Read More Blogs

"Privacy groups have long worried about Google's privacy policies --- and now it appears that consumers have followed suit. Google..." Read more Read More Blogs

"Cisco is going to be finding out, the hard way, that open source isn't the same thing as free software...." Read more Read More Blogs

"Google's releasing the not-yet-baked Chrome as 1.0, rather than continuing to develop it as a beta, is the company's biggest..." Read more Read More Blogs

More Networking Blogs More Networking Blogs
See all Computerworld Blogs See all Computerworld Blogs
Shark Bait
View Shark BaitFired up about IT? Join Sharkbait and share your true tales of IT. SharkBait is the place for you to sound off about everything IT – the good, the bad, and the rest of the weird stuff you deal with every day.

New baits
Shark Bait
The Impact of Social Networks on Mobility Strategies
The Impact of Social Networks on Mobility Strategies
Download this webcast, free, compliments of RIM.
Go to the webcast 
Computerworld Executive Briefing: Automating Network Management
Download this Executive Briefing now (a $195.00 value), compliments of ProCurve Networking by HP.
(Source: Computerworld) This briefing looks at the basics of network management, which tend to get lost in the dizzying array of products and processes. It also examines new tools that are on the way to help IT executives deal with management in the new era of automation.Download this Executive Briefing now (a $195.00 value), compliments of ProCurve Networking by HP.
Download this executive briefing download
Guide: Implementing UTM at Branch
Download this new guide today!
(Source: Juniper) Anti-X technologies have been predominately deployed in larger campus and data center networks. Deploying this type of security technology across distributed enterprises at hundreds of small branch offices, has been until recently impractical and simply cost-prohibitive. As a result, enterprises simply ignored branch security altogether. Juniper has integrated these latest security technologies into its entire line of branch firewalls, consolidating key functions into a single device - Secure Services Gateways (SSG).
Download this white paper go
White Papers
Read up on the latest ideas and technologies from companies that sell hardware, software and services.
The Total Economic Impact of the Altiris Total Management Suite Software
Go Green with IBM System x Servers and Intel Xeon Processors
Creating a green data center to help reduce energy costs and gain a competitive advantage
View more whitepapers 
Your Say
Chrome a Windows killer?
Anonymous wrote: Having to be connected to use apps that are not inherently dependent upon being connected is a liability...
[read the story | have your say]
Hot topics now:
Premier 100
For more information or to register, please visit premier100.com.

Storage Networking World (SNW)
For more information or to register, please visit snwusa.com.

Mobile & Wireless World (MWW)
For more information or to register, please visit mwwusa.com.

Infrastructure Management World (IMW)
For more information or to register, please visit imworldusa.com.

Business Intelligence Perspectives
For more information or to register, please visit biperspectives.com.

IT Executive Summits
For more information or to register, please visit itexecutivesummit.com.
See all events see all events