Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2006 Stories
-
November 26, 2006
26Nov2006
News
Virtualisation buying guide [Day Two: Virtualisation software examined]
Deploying software on a server or dedicated appliance is often easier for smaller organisations, but the actual product choice demands careful consideration. Now that you've reviewed the essential issues involved in any virtualisation product, this ... Continue Reading
-
November 26, 2006
26Nov2006
News
Storage management tools get more flexible
After a decade of proprietary storage management tools, vendors are finally giving users more choices and freeing them up to buy only what they need. Continue Reading
-
November 23, 2006
23Nov2006
News
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers. Continue Reading
-
November 23, 2006
23Nov2006
News
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers. Continue Reading
-
November 22, 2006
22Nov2006
News
Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act. Continue Reading
-
November 22, 2006
22Nov2006
Tip
Wireless connections with ad hoc networks
Ad hoc wireless networking in Windows Vista with the IPv6 protocol has its risks, but it also has several built-in security mechanisms. In this tip, Brien Posey explains how these security features help counteract some risks of wireless networks. Continue Reading
-
November 21, 2006
21Nov2006
News
Skills gap grips India's budding storage market
India is the second fastest growth market for storage technology in Asia Pacific after China, according to IDC, but a skills shortage could hamper growth, experts say. Continue Reading
-
November 21, 2006
21Nov2006
News
Virtual SAN purchase considerations
The specific considerations for key virtual SAN products plus a series of specifications to help make on-the-spot product comparisons between vendors. Continue Reading
-
November 21, 2006
21Nov2006
News
Virtual SAN product specifications
Product snapshots that highlight key specifications for a cross-section of VSAN platforms selected based on input from industry analysts and SearchStorage.com editors. Continue Reading
-
November 21, 2006
21Nov2006
News
New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days. Continue Reading
-
November 21, 2006
21Nov2006
News
BakBone brushes up replication software
BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine. Continue Reading
-
November 21, 2006
21Nov2006
News
Long-term archiving needs better media, experts say
The hundred-year archive is coming soon, and industry watchers say a new physical medium for long-term storage should come with it. Continue Reading
-
November 21, 2006
21Nov2006
News
Telecom overspending -- thwart it!
Research has found that telecom overspending is out of control, but a new batch of software is out there to help enterprises get a handle on their telecom billing. Continue Reading
-
November 21, 2006
21Nov2006
News
Firefox, IE flaw could expose passwords
A flaw in Firefox 2.0 and IE could affect anyone visiting a Web site that allows user-contributed HTML codes to be added, according to Chapin Information Services. Continue Reading
-
November 20, 2006
20Nov2006
News
BakBone NetVault upsets in Quality Awards, page 5
About the authors and the backup software survey. Continue Reading
-
November 20, 2006
20Nov2006
News
Insider security threats come in many forms
Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers. Continue Reading
-
November 20, 2006
20Nov2006
News
Backup software: BakBone upsets in Quality Awards, page 3
Evaluating backup software products over the long haul: product reliability and repurchasing intentions. Continue Reading
-
November 20, 2006
20Nov2006
News
Backup software: BakBone upsets in Quality Awards
This year's Diogenes Labs-Storage magazine Quality Awards for backup software had a come-from-behind winner: BakBone's NetVault. Continue Reading
-
November 20, 2006
20Nov2006
News
Backup software: BakBone upsets in Quality Awards, page 4
The results for tech support and salesforce competence in backup software. Continue Reading
-
November 20, 2006
20Nov2006
News
Backup software: BakBone upsets in Quality Awards, page 2
BakBone was the overall winner, but beaten out by CommVault in the product features category of our backup software Quality Awards. Continue Reading
-
November 19, 2006
19Nov2006
News
Virtualisation: friend or foe? [Day Two: The virtual appliance]
Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this ... Continue Reading
-
November 16, 2006
16Nov2006
News
How can a small business achieve high quality VoIP?
As a small trader, I must be able to communicate with my trading partners who are often in other countries. We use IP telephony to keep costs down. Can you suggest how I can have high quality VoIP calls that will exceed PSTN call quality? Continue Reading
-
November 16, 2006
16Nov2006
News
Why do VoIP calls remain active after the phone call is ended?
For our small business needs, we use a Linksys PAP for our IP telephony service. Sometimes though, we noticed that the call will remain active after we have ended the call and hung up. How do we configure the ATA or gateway to avoid this problem? Continue Reading
-
November 16, 2006
16Nov2006
News
Why is UDP used more in VoIP than TCP?
If UDP is unreliable, why is it used more in VoIP rather than TCP? Continue Reading
-
November 16, 2006
16Nov2006
News
What is the difference between VoIP, CTI and IP telephony?
What is the difference between VoIP, CTI (Computer Telephony Integration) and IP telephony? Continue Reading
-
November 16, 2006
16Nov2006
News
Can VoIP work on a GPRS-enabled mobile phone?
Is it possible to use VoIP on GPRS-enabled mobile phones? Continue Reading
-
November 16, 2006
16Nov2006
News
When should a VoIP system be analyzed and with what tools?
We have recently implemented a VoIP network with separate VLANs and QoS. It all seemed to be working fine when it first went in, but recently, certain people have been complaining about sound breakup whilst talking to customers on the phone. Continue Reading
-
November 16, 2006
16Nov2006
News
VoIP news briefs: Verizon Business, TheInfoPro and Ovum
Verizon Business introduces a new management portal; TheInfoPro looks at the rate of VoIP adoption; and Ovum warns of VoIP security threats. Continue Reading
-
November 15, 2006
15Nov2006
In Depth
Is the SANS Top 20 still useful?
This week in Security Blog Log: Some experts ponder whether the SANS Institute's Top 20 vulnerability list is as valuable than it once was. Others weigh in on the VoIP threat. Continue Reading
-
November 15, 2006
15Nov2006
News
How is average repair time determined for both a TDM PBX and a VoIP system?
I am trying to find some statistics on average time to repair or troubleshoot VoIP and TDM PBX. We heard PBX takes 30 minutes versus VoIP at 4.5 hours -- is this true? Continue Reading
-
November 15, 2006
15Nov2006
News
How can VoIP be integrated into an existing PBX system?
I am trying to integrate VoIP into my existing PBX system. I have a Talkswitch 48CVA which supports both PSTN and VoIP lines. My main phone number is a landline which forwards calls to my VoIP line when my status is busy or I do not answer. Continue Reading
-
November 15, 2006
15Nov2006
News
EMC, NetApp duke it out in the midrange storage
As NetApp gains market share in midrange storage, EMC makes a rare response to performance claims. Continue Reading
-
November 14, 2006
14Nov2006
News
SANS: VoIP, zero-day threats surge
Digital miscreants are using VoIP and a growing pile of zero-day flaws to launch a ferocious wave of targeted, financially-motivated attacks, according to the SANS Institute. Continue Reading
-
November 14, 2006
14Nov2006
News
Fiber optic networks vulnerable to attack
Fiber optic networks aren't hack-proof: A savvy attacker can crack them with ease. Continue Reading
-
November 13, 2006
13Nov2006
News
Trojan poses as Adobe software update
The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information. Continue Reading
-
November 13, 2006
13Nov2006
News
IM, Skype, P2P open security holes: Survey
IM, Skype, Web conferencing and other real-time applications are a major concern to IT, but end users seem to shrug off the risks, a new survey has found. Continue Reading
-
November 13, 2006
13Nov2006
News
Firefox antiphishing feature beats Internet Explorer in Mozilla test
A Firefox automated antiphishing feature beat IE 7 in a test conducted by Mozilla, but analysts say large enterprises should focus on spam blocking software. Continue Reading
-
November 12, 2006
12Nov2006
News
Wireless device flaw discovered
A Broadcom wireless device driver, common in millions of laptops, is vulnerable to an attack, according to an advisory from the Month of Kernel Bugs. Continue Reading
-
November 10, 2006
10Nov2006
News
The big security/storage crossover: Is your job safe? [Part Four: The new age of abstraction]
The collision of storage and security will mean chances for professionals in both disciplines to accelerate their careers into areas where strategic and business skills become more important than technical sills alone, according to David Webster, ... Continue Reading
-
November 09, 2006
09Nov2006
In Depth
Security Blog Log: Sailing a sea of spam
This week, bloggers struggle to purge their bloated inboxes. Their experiences lend weight to recent studies showing a breathtaking spike in spam. Continue Reading
-
November 09, 2006
09Nov2006
Podcast
Podcast: Tor peer-to-peer privacy could be hacked
In this edition of Security Wire Weekly, Andrew Christensen of FortConsult explains how the Tor peer-to-peer network can be hacked to track down user identities. Continue Reading
-
November 09, 2006
09Nov2006
News
The big security/storage crossover: Is your job safe? [Part Three: Why consumers count]
Is the cutting edge of security and storage in business, or in your lounge room? In this third installment in our four part series, Symantec's David Sykes explains why consumer behavior is the key to understanding what lies ahead. Continue Reading
-
November 09, 2006
09Nov2006
News
IBM announces 'bulletproofed' midrange arrays
New additions to the DS4000 line will feature built-in batteries and sealed enclosures to be in compliance with the telecom industry's NEBS standard. Continue Reading
-
November 08, 2006
08Nov2006
News
Storage virtualization acquisitions need careful consideration
Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. ... Continue Reading
-
November 08, 2006
08Nov2006
News
The big security/storage crossover: Is your job safe? [Part Two: The analyst]
Storage and security staff sometimes possess the same skills. What does that mean for your job prospects in the field? In this second part of a four part series, TechTarget ANZ asks Gartner's Phil Sergeant what lies ahead for professionals in these ... Continue Reading
-
November 08, 2006
08Nov2006
News
VoIP security safeguards -- they may be there already
Protecting your VoIP system may be easier than you think, especially since many of the necessary tools are already there. Continue Reading
-
November 08, 2006
08Nov2006
News
High-end clustering users contemplate snapshots
Some users and analysts say the line between high-performance NAS clusters and enterprise NAS systems continues to blur as clustering vendors begin to include enterprise features. Continue Reading
-
November 08, 2006
08Nov2006
News
Microsoft to patch critical zero-day flaws in Windows
Microsoft plans to repair five critical flaws in Windows and a flaw in XML Core Services as part of its monthly patch update next week. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 8
Big pay for storage jobs, page 8 Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 6
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 3
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 7
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 4
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 5
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Big pay for storage jobs, page 2
Find out what other storage professionals are being paid in this year's salary survey. Continue Reading
-
November 07, 2006
07Nov2006
News
Mozilla fixes Firefox flaws
Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code. Continue Reading
-
November 07, 2006
07Nov2006
News
NetApp to acquire Topio
Six months after EMC acquired heterogeneous replication provider Kashya, NetApp jumps on the bandwagon by announcing plans to acquire Topio for $160M. Continue Reading
-
November 07, 2006
07Nov2006
News
VMware backup still tough
VMware backup using Consolidated Backup is easier said than done, according to users at this week's VMworld show in Los Angeles. Continue Reading
-
November 06, 2006
06Nov2006
News
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed. Continue Reading
-
November 06, 2006
06Nov2006
News
The big security/storage crossover: Is your job safe? [Part One: The recruiter]
Since EMC acquired RSA and Symantec enveloped Veritas, both have started discussing 'protection' of data as the sensible sequel to both storage and security. In the first of a four part series series, TechTarget ANZ asks several industry experts ... Continue Reading
-
November 06, 2006
06Nov2006
News
Agency improves security grades under CISO's watch
CISO Philip Heneghan has made security a way of life for the U.S. Agency for International Development (USAID). His work earned him a Security 7 award. Continue Reading
-
November 06, 2006
06Nov2006
News
Softek rides IBM mainframe wave, plans acquisition
Data migration software provider Softek is planning to acquire Enigma to boost its mainframe storage software business. Continue Reading
-
November 06, 2006
06Nov2006
News
Sourcefire IPO could fuel Snort, users say
Snort users frowned when Check Point tried to acquire Sourcefire last year. But they are more optimistic about Sourcefire's plans to go public. Continue Reading
-
November 05, 2006
05Nov2006
News
Microsoft eyes second zero-day threat in a week
This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available. Continue Reading
-
November 05, 2006
05Nov2006
News
Mobile device encryption - a practice not often applied
Encryption is the best way to protect data on mobile devices -- but too few companies are actually deploying this critical technology. Continue Reading
-
November 05, 2006
05Nov2006
News
NetApp adds a midrange box, tunes up software
NetApp adds the FAS3070 to its midrange lineup to compete with EMC's CX3-80 and updates a number of its software products. Continue Reading
-
November 02, 2006
02Nov2006
In Depth
Security Blog Log: Dissecting Firefox 2.0
This week, bloggers examine the security features of Firefox 2.0 and come away with mixed reviews. Does it fare better than Internet Explorer 7? Continue Reading
-
November 02, 2006
02Nov2006
In Depth
Review: Arbor Networks' Peakflow X 3.6
Hot Pick: Peakflow isn't cheap and requires an intimate understanding of data flows, applications and network infrastructure. But the investment will pay dividends. Continue Reading
-
November 02, 2006
02Nov2006
In Depth
Review: Network Intelligence's enVision
enVision offers excellent value and is highly configurable, though typically that means you have to put a lot into it to get the most out of it. Continue Reading
-
November 02, 2006
02Nov2006
News
Reporter's Notebook: Whispers and rumbles from SNW
Floridians talked DR, big guys quibbled over deduplication, and rumors of acquisitions and new products to come flew at SNW Orlando this year. Continue Reading
-
November 02, 2006
02Nov2006
News
Review: SPI Dynamics' WebInspect 6.1
SPI Dynamics has created a powerful tool for novices as well as advanced users who will appreciate the time and effort it saves. Continue Reading
-
November 01, 2006
01Nov2006
News
Tor network privacy could be cracked
The Tor network is used by those who want to keep their IP addresses private. But new research shows that it's possible to compromise the system and unmask the user. Continue Reading
-
November 01, 2006
01Nov2006
In Depth
Download Advanced Storage Guide Chapter 2: Backup/Data protection (PDF)
A printable version of our Advanced Storage All-In-One Guide. Download Chapter 2: Backup/Data protection in .pdf format now. Continue Reading
-
November 01, 2006
01Nov2006
In Depth
VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them. Continue Reading
-
November 01, 2006
01Nov2006
News
Juniper Networks' enterprise router takes aim at Cisco branches
Juniper's new branch office J-Series routers provide all-in-one security, VoIP, WAN acceleration box to rival Cisco's ISR router. Continue Reading
-
November 01, 2006
01Nov2006
News
VoIP convergence: Managing staffing issues
Companies making the transition to IP telephony must find a way to converge their voice and data networks -- and the employees who work on them. Continue Reading
-
November 01, 2006
01Nov2006
News
What is a seamless router?
In this expert response, Sudhanshu Gupta gives us a quick history lesson in routing when he answers the question "what is meant by the term 'seamless router'?" Continue Reading
-
November 01, 2006
01Nov2006
News
Exploit code released for Apple Wi-Fi flaw
Details on how to attack a flaw in Apple's wireless software were released as part of a new project called the "Month of Kernel Bugs." Continue Reading
-
October 31, 2006
31Oct2006
In Depth
Production databases find a home on IP SANs
Dow Chemical will be cutting costs with a NetApp system; AirClic goes with EqualLogic's newest SAS array after evaluating both NetApp and EMC. Continue Reading
-
October 31, 2006
31Oct2006
News
E-vaulting's many faces can confuse IT efforts
E-vaulting is the process that describes how enterprise IT departments ship backup tapes and replicate data to remote disk arrays and VTLs. E-vaulting is not a new concept, but more recently it has grown to mean remote backups and replication for ... Continue Reading
-
October 31, 2006
31Oct2006
News
Flaw found in Firefox 2.0
Attackers could exploit the security flaw to crash versions 1.5.0.7 and 2.0 of the browser, according to various security advisories. Continue Reading
-
October 31, 2006
31Oct2006
Podcast
Podcast: The state of Oracle security
In this edition of Security Wire Weekly, Oracle DBA Jon Emmons gives his observations about Oracle's new critical patch update format. Continue Reading
-
October 31, 2006
31Oct2006
News
Five years until FAN's a hit: Brocade Australia
File Area Networks (FANs) will take around five years to become a ubiquitous piece of enterprise storage infrastructure, according to Graham Schultz, Brocade's Country Manager for Australia. Continue Reading
-
October 31, 2006
31Oct2006
News
Internode covers Coorong with solar-powered broadband
Internode has blended super-fast ADSL2+ broadband with solar-powered microwave towers to deliver virtually total broadband coverage across South Australia's largest local government region. Continue Reading
-
October 31, 2006
31Oct2006
News
In IT security, vendor size does not compute
With consolidation gripping the security industry, companies are seeking out the most stable security vendors, but analysts and experts say the biggest firms aren't necessarily the most prudent investment. Continue Reading
-
October 31, 2006
31Oct2006
News
Zero-day attacks target Microsoft Visual Studio
Microsoft has outlined a series of steps users should take to protect their machines from attacks that exploit a new zero-day flaw in Visual Studio 2005. Continue Reading
-
October 31, 2006
31Oct2006
News
Net neutrality: All or nothing, or somewhere in between?
The notion of net neutrality can hinder VoIP QoS guarantees and thus has incited a contentious debate. Continue Reading
-
October 30, 2006
30Oct2006
News
Countermeasures for malicious email code
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are ... Continue Reading
-
October 30, 2006
30Oct2006
News
Instant messaging attacks rise in October
In October alone, security firm Akonix Systems tracked 88 attacks that used instant messaging programs to spread. Attackers are also exploiting P2P programs. Continue Reading
-
October 30, 2006
30Oct2006
News
Messaging Security School
SearchSecurity.com's Messaging Security School has brought together some of the most knowledgeable experts in the messaging security field to offer you personal instruction on how to secure the information handled by your organization's knowledge ... Continue Reading
-
October 30, 2006
30Oct2006
News
Wireless network security testing
The abundance of wireless devices is making wireless networks -- both authorised and unauthorised -- more common. Attack your own wireless networks to find vulnerabilities before malicious hackers do. Security testing expert Kevin Beaver covers the ... Continue Reading
-
October 30, 2006
30Oct2006
News
Survey: Data breach costs surge
A new study by the Ponemon Institute finds a 31% increase in the costs associated with a data breach. Continue Reading
-
October 30, 2006
30Oct2006
News
Storage vendors polish their wares at SNW, page 2
EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost. Continue Reading
-
October 30, 2006
30Oct2006
News
Storage vendors polish their wares at SNW
EMC upgrades recovery management software, HP unveils a storage blade and VTL gateway for the EVA; IBM sweetens warranty for DS8000; Symantec updates Backup Exec and Ghost. Continue Reading
-
October 30, 2006
30Oct2006
News
Firefox fans unfazed by IE 7
IT administrators like the security improvements in IE 7. But for those who use Firefox, Microsoft's browser upgrade isn't enough to make them switch. Continue Reading
-
October 29, 2006
29Oct2006
In Depth
Download Advanced Storage Guide Chapter 1: Storage components (PDF)
A printable version of our Advanced Storage All-In-One Guide. Download Chapter 1: Storage components in .pdf format now. Continue Reading
-
October 26, 2006
26Oct2006
News
Security Blog Log: The never-ending PatchGuard debate
This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood? Continue Reading
-
October 26, 2006
26Oct2006
News
Achieving compliance: a real-world roadmap
A security manager's responsibilities extend beyond the technical aspects of the job. These days, effective governance and compliance are just as essential. Continue Reading
-
October 26, 2006
26Oct2006
News
What storage managers are buying and why
The second installment of the 2006 edition of Storage magazine's exclusive Purchasing Intentions Survey reveals key storage technology purchasing decisions by storage managers across all industries. Continue Reading