Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2004 Stories
-
December 30, 2004
30Dec2004
News
Archive: Bits & Bytes column library
Bits & Bytes column library archive -- 2003 to 2004 Continue Reading
-
December 20, 2004
20Dec2004
News
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround. Continue Reading
-
December 19, 2004
19Dec2004
News
Transforming the cybersecurity culture
Eleven New Year's resolutions can help employees at all levels empower the security function at their organization. Continue Reading
-
December 19, 2004
19Dec2004
News
Security Bytes: Be aware of Google Desktop 'glitch'
Cisco acquires Protego; Hotmail switches to Trend Micro; Red Hat, Mandrakesoft and Gentoo fix flaws. Continue Reading
-
December 14, 2004
14Dec2004
In Depth
Grid gobbledygook hits storage
Fearful as always of missing the boat, storage vendors are jumping on the grid bandwagon, unveiling visions that are about as useful today as a chocolate teapot. Continue Reading
-
December 13, 2004
13Dec2004
Tip
Pros and cons of disk-to-disk backup
Some of the characteristics of disk-to-disk can make it a poor choice for your only form of backup. Continue Reading
-
December 09, 2004
09Dec2004
News
Data storage history quiz
We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data... Continue Reading
-
December 08, 2004
08Dec2004
News
The security lingo of 2004
This was the year of botnets, zombie PC armies and phishying online schemes. Continue Reading
-
December 05, 2004
05Dec2004
News
Think Sarbanes Oxley extension changes things? Think again
-
December 01, 2004
01Dec2004
News
Phreaks love Bluetooth
Bluetooth is becoming the vector of choice for next-generation phone phreakers to swipe files from other users, make calls or render mobile phones completely useless. Continue Reading
-
November 30, 2004
30Nov2004
News
Botnets target the enterprise warn experts
Versatile and increasingly vicious bots will cause enterprises a lot of grief in 2005, security experts say. Continue Reading
-
November 21, 2004
21Nov2004
News
Crash Course: Recovery
What good is backing up your data if you can't get it back? The goal of this Crash Course on recovery is to make sure you can effectively and efficiently recover data no matter what iteration of the lifecycle it's in. Included here are also hints on... Continue Reading
-
November 12, 2004
12Nov2004
News
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control. Continue Reading
-
November 04, 2004
04Nov2004
Opinion
Demand more from agencies: fine tune the recruitment process and reap the rewards
Users must be proactive in ensuring that recommended candidates are suitable Continue Reading
-
October 31, 2004
31Oct2004
News
Fast Guide: Storage Management
Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has ... Continue Reading
-
October 28, 2004
28Oct2004
News
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters. Continue Reading
-
October 27, 2004
27Oct2004
News
Spamming the universe
-
October 26, 2004
26Oct2004
News
IBM sharpens blades
IBM has announced new management tools and upgraded models of its HS20 and JS20 blade servers. Continue Reading
-
October 26, 2004
26Oct2004
News
Clear double advantage
ClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and... Continue Reading
-
October 21, 2004
21Oct2004
In Depth
IP everything, essentially
What are the fundamental deliverables of IP networks? How can you use IP networks to gain financial benefits in addition to... Continue Reading
-
October 21, 2004
21Oct2004
In Depth
The basis of profitability
Not so long ago, you didn't have much choice - your IT and communications requirements were acquired, implemented and maintained... Continue Reading
-
October 18, 2004
18Oct2004
News
Smaller companies installing SP2; larger firms not
-
October 08, 2004
08Oct2004
News
First integrated children's system goes live
The first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers... Continue Reading
-
October 04, 2004
04Oct2004
News
Symantec offers bare metal restore software
-
October 03, 2004
03Oct2004
News
Training for CISSP Certification: SearchSecurity.com's Security School
Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices. Continue Reading
-
September 27, 2004
27Sep2004
News
Fast Guide: iSCSI
If you need to come up to speed rapidly on iSCSI, you've come to the right place. In this Fast Guide, we touch upon the basics and then we walk you through the pros and cons of iSCSI and Fibre Channel. Continue Reading
-
September 27, 2004
27Sep2004
News
Five steps to using the Kerberos protocol
This excerpt from "Windows Server 2003 security infrastructures" explains the basic Kerberos protocol as it is defined in RFC 1510. Continue Reading
-
September 26, 2004
26Sep2004
News
Authorize.Net says it has 'learned' from attack
The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security. Continue Reading
-
September 23, 2004
23Sep2004
News
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets. Continue Reading
-
September 22, 2004
22Sep2004
News
Security Bytes: New .jpg attack imminent; CA agrees to pay $225 million for federal violations
Sanjay Kumar is indicted for securities fraud and conspiracy, while Authorize.Net is knocked offline by massive DDoS attacks. Continue Reading
-
September 21, 2004
21Sep2004
News
Survey shows SOX bringing IT, business together
-
September 19, 2004
19Sep2004
News
Hackers costing enterprises billions
Symantec's semi-annual Internet Threat Report finds hackers continued adding billions to the cost of doing business on the Internet. Continue Reading
-
September 17, 2004
17Sep2004
News
Swansea strike battle to go to Acas
Swansea Council and its striking IT staff are set to go to arbitration service Acas to settle a six-week dispute over a proposed... Continue Reading
-
September 14, 2004
14Sep2004
In Depth
The gift of CRM
For Red Letter Days, a provider of gift experiences for corporates and consumers, a CRM system was essential to give it market... Continue Reading
-
September 14, 2004
14Sep2004
In Depth
Management matters
Cath Everett finds out how you stay on top of networking. What are the management issues related to your telecoms and networks... Continue Reading
-
September 05, 2004
05Sep2004
In Depth
Storage Management Survival School: Lesson five
In this session, Jamie Gruener examines the steps you should consider in designing a tiered storage model, what the pitfalls are and the overall benefits. Continue Reading
-
September 01, 2004
01Sep2004
News
Security Bytes: MySQL upgrade urged to fix flaw
Internet turns 35; federal computers used as spam relays; XP SP2 a bigger pain for smaller companies. Continue Reading
-
August 27, 2004
27Aug2004
News
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year Continue Reading
-
August 24, 2004
24Aug2004
News
Latest worm uses IM to lure victims
A version of the worm which spread from infected Microsoft Internet Information Services (IIS) web servers in June has been... Continue Reading
-
August 22, 2004
22Aug2004
Tip
Microsoft supports iSCSI SAN clusters -- kind of
This expert tip outlines how to get the support you need for iSCSI SANs using more than two clusters. Continue Reading
-
August 13, 2004
13Aug2004
In Depth
Undercover operations
Computer crime is on the rise, but collecting admissible evidence is a tricky business. Helen Beckett gets expert advice on what... Continue Reading
-
August 03, 2004
03Aug2004
News
Apple's SAN file system turns heads
-
July 28, 2004
28Jul2004
News
Automated SQL injection: What your enterprise needs to know
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk. Continue Reading
-
July 27, 2004
27Jul2004
News
New attacks and vulnerability trends highlighted at Black Hat
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics. Continue Reading
-
July 26, 2004
26Jul2004
News
Fewer IT supplier conflicts are going to court
Law firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn... Continue Reading
-
July 25, 2004
25Jul2004
News
Learning about Security Threats: Profiling
A look at what it means to be a hacker. Continue Reading
-
July 25, 2004
25Jul2004
News
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots. Continue Reading
-
July 18, 2004
18Jul2004
News
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data. Continue Reading
-
July 18, 2004
18Jul2004
News
Debian fixes multiple flaws
Denial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious code has been fixed. Continue Reading
-
July 14, 2004
14Jul2004
News
Continuous backup gains traction
For continuous backup technology, 2004 is the year that vendors have moved from promises to actual products. Although the market is still small -- inhabited by startups such as Revivio, Mendocino Software, Alacritus and XOsoft -- the buzz is ... Continue Reading
-
July 09, 2004
09Jul2004
News
Old Mutual rolls out web reporting software to meet new regulations
Financial services group Old Mutual has rolled out web-based reporting software across its business worldwide to consolidate data... Continue Reading
-
July 07, 2004
07Jul2004
News
Deals abound for high-end storage
Think high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to give buyers the best possible deals. Continue Reading
-
June 21, 2004
21Jun2004
News
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services. Continue Reading
-
June 01, 2004
01Jun2004
News
Startup steals a win with thin provisioning
The Allant Group chose 3Pardata for its thin provisioning software, while dirty sales tactics kept EMC out of the deal. Continue Reading
-
June 01, 2004
01Jun2004
News
From exposition to exploit: One security book's story
A new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring. Continue Reading
-
June 01, 2004
01Jun2004
News
Ex-helicopter chief says pilot verdict is 'ridiculous'
A former director of helicopter procurement at the Ministry of Defence has described the blaming of the pilots for the crash on... Continue Reading
-
June 01, 2004
01Jun2004
News
Report finds computer system likely culprit in Chinook crash
A former air commodore - one of the highest ranks in the RAF - has questioned the airworthiness of the Chinook Mk2 helicopter... Continue Reading
-
June 01, 2004
01Jun2004
News
Chinook 10 years on
This week sees the 10th anniversary of the Chinook ZD576's crash, as former top military officers cast doubt on the finding that... Continue Reading
-
May 28, 2004
28May2004
News
Ex-RAF chief says no to blame on Chinook
A former RAF air commodore has questioned the integrity of systems and the airworthiness of the type of Chinook helicopter which... Continue Reading
-
May 23, 2004
23May2004
News
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver. Continue Reading
-
May 19, 2004
19May2004
News
LAN-free, serverless and domino backups, oh my.
In case you've missed anything, here's a roundup of some of the best original technical content that appeared on SearchStorage.com the week of May 10-14. Tips and Ask the Experts Q&A's cover LAN-free, serverless and domino backups.
Continue Reading -
May 19, 2004
19May2004
News
IT experts not losing sleep over code theft
Days after Cisco acknowledged someone may have stolen source code from its network, IT experts said they doubt it will amount to anything catastrophic. After all, source code has made it onto the Internet before, and there's no proof it has ever led... Continue Reading
-
May 16, 2004
16May2004
News
Consequences of Cisco source code theft unclear
Opinions are divided on the impact of stolen data now circulating on the Internet. Continue Reading
-
May 13, 2004
13May2004
News
Hacking For Dummies: Chapter 7 -- Passwords
In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks. Continue Reading
-
May 10, 2004
10May2004
News
'Whispering keyboards' could be next attack trend
An IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes. Continue Reading
-
May 02, 2004
02May2004
News
Return to sender?
Several researchers have identified a new e-mail attack that can be used to swamp enterprise e-mail servers, as well as some secondary systems. Continue Reading
-
April 27, 2004
27Apr2004
News
Backup school: Quiz two, answer six
Here is the answer to Backup school quiz two, question six. Continue Reading
-
April 21, 2004
21Apr2004
News
Startup offers fixed-content archive for multiple applications
Former CTO of the New York Times has started Archivas, a company that archives fixed content from different applications in a single, centralized repository for half the price of EMC's Centera. Continue Reading
-
April 20, 2004
20Apr2004
News
Cisco SNMP flaw allows for DoS attacks
A coding flaw in Cisco's IOS software for certain routers and switches could leave networks vulnerable to denial-of-service attacks. Continue Reading
-
April 19, 2004
19Apr2004
News
UK clearing house joint venture to provide online payment service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
-
April 15, 2004
15Apr2004
News
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and... Continue Reading
-
April 11, 2004
11Apr2004
News
IBM and Cisco battle remote attack vulnerabilities
-
March 28, 2004
28Mar2004
News
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
Read Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade. Continue Reading
-
March 22, 2004
22Mar2004
In Depth
Is the national programme for NHS IT set to be 'the biggest gamble in the world'?
The private concerns of clinicians and IT professionals about the national programme are not being addressed, despite the front... Continue Reading
-
March 17, 2004
17Mar2004
News
Best practices for enabling and maintaining compliance
As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice president of IT at Essex Investment Management Company and Enterprise Storage Group's Peter Gerr discussed... Continue Reading
-
March 15, 2004
15Mar2004
In Depth
Achieving the goal of CIO
What exactly does a chief information officer do?Paul Burfitt, global CIO at AstraZeneca, analysed the various aspects of his job... Continue Reading
-
March 01, 2004
01Mar2004
News
There's no government like no government
-
February 24, 2004
24Feb2004
News
Exploiting Software: How to Break Code, Chapter 7 -- Buffer Overflow
This excerpt is from Chapter 7, Buffer Overflow of Exploiting Software: How to Break Code written by Greg Hoglund and Gary McGraw. Continue Reading
-
February 23, 2004
23Feb2004
News
Somerfield speeds up product development with online system
Supermarket chain Somerfield will this week go live with the first stage of an initiative to computerise its new product... Continue Reading
-
February 15, 2004
15Feb2004
News
Seagate touts SAS drives as faster alternative to SATA
Seagate is set to demonstrate a 2.5-inch hard drive based on the serial-attached SCSI interface. The company says the product will fill the need for a smaller, faster and more reliable alternative to serial ATA disks. Continue Reading
-
February 09, 2004
09Feb2004
News
More questions and answers from SAN School lesson # 5
Here are additional questions and answers from SAN School Lesson 5: Designing a SAN. The questions cover topics ranging from how to determine an effective SAN design to meet your needs, to the differences between fabric switches and loop switches. Continue Reading
-
February 09, 2004
09Feb2004
News
More questions and answers from SAN school lesson # 8
Here are SAN School Professor Chris Poelker's answers to more user submitted questions from SAN School Lesson 8, "Tying your SANs together." Q&A's cover topics ranging from what causes SAN problems, to preventing equipment problems. Continue Reading
-
January 23, 2004
23Jan2004
News
Banks turn to alert systems to fight back against phishing attacks
UK banks and retailers are investigating e-mail monitoring services that could offer early warning of “phishing” attacks by... Continue Reading
-
January 15, 2004
15Jan2004
News
Resource guide to disk-based backup
-
January 12, 2004
12Jan2004
In Depth
Thought for the day: Flights of fancy
The Windows versus Linux debacle continues to escalate into a heady mix of emotion, mud-slinging and complexity Continue Reading
-
January 04, 2004
04Jan2004
News
Security legislation: Where's the breach?
Security legislation isn't all that it's cracked up to be. Find out how California's SB 1386 is letting some breaches fall through the cracks. Continue Reading