Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
August 22, 2007
22Aug2007
News
Microsoft adds CA vets to anti-malware team
Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab. Continue Reading
-
August 22, 2007
22Aug2007
In Depth
VoIP performance management abounds at VoiceCon
VoIP performance management tools were announced at VoiceCon, signaling a shift in focus from infrastructure to end-user experience. Continue Reading
-
August 22, 2007
22Aug2007
News
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042. Continue Reading
-
August 21, 2007
21Aug2007
News
VoIP performance management abounds at VoiceCon
VoIP performance management tools announced at VoiceCon show that vendors are focusing on user experience over infrastructure. Continue Reading
-
August 21, 2007
21Aug2007
News
Hosted VoIP: Take the headache and heartache out of VoIP, Part 2
Part 2 of this series investigates the QoS and security issues of the hosted VoIP model. Continue Reading
-
August 21, 2007
21Aug2007
In Depth
Hosted and managed VoIP fundamentals
Adoption rates of hosted VoIP and managed VoIP are increasing as more companies look to reduce the costs and complexities of deploying VoIP in house. Enterprises are factoring revenue growth, enhanced productivity and communication services into ROI... Continue Reading
-
August 21, 2007
21Aug2007
In Depth
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
-
August 21, 2007
21Aug2007
News
Nigel Phair, author of 'Cybercrime: The Reality of the Threat', on Australia's response
In the first instalment of a three part interview, TechTarget Australia's Patrick Gray interviews Australian Federal Police Agent Nigel Phair about his new book: Cybercrime: The Reality of the Threat. Until recently, Phair was the Team Leader of ... Continue Reading
-
August 20, 2007
20Aug2007
News
Hosted VoIP: Take the headache and heartache out of VoIP, Part 1
No matter what size network an enterprise is running these days, large and small alike are faced with increasing technical and financial challenges. Continue Reading
-
August 20, 2007
20Aug2007
News
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Continue Reading
-
August 20, 2007
20Aug2007
News
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology. Continue Reading
-
August 20, 2007
20Aug2007
News
3PAR, EqualLogic file for IPOs
The emerging storage companies file S-1 forms with the SEC, though some experts warn they could be headed for a volatile market. Continue Reading
-
August 19, 2007
19Aug2007
News
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications. Continue Reading
-
August 19, 2007
19Aug2007
News
Push voice is the next mobility must-have
Push voice, coupled with mobile email, has the potential to make the smartphone a true mobile office. Continue Reading
-
August 19, 2007
19Aug2007
News
Your networking certification game plan
To pass your networking certification exams, use these suggested lab setups, activities and reading materials to CompTIA A+, MCSE, Network+, MCSA, CCNA and Linux+ certify. Continue Reading
-
August 17, 2007
17Aug2007
News
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network. Continue Reading
-
August 17, 2007
17Aug2007
In Depth
Voice over WLAN improves a hospital's communications
A Voice over WLAN (VoWLAN) system was the solution to improving communications and response times for staff at one hospital, while boosting employee satisfaction. Continue Reading
-
August 17, 2007
17Aug2007
News
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity. Continue Reading
-
August 17, 2007
17Aug2007
News
Compliance, data breaches heighten database security needs
Experts say database platforms lack robust native encryption, monitoring, assessment and management tools to meet demanding new security requirements. Continue Reading
-
August 16, 2007
16Aug2007
Tip
Network analysis -- Enhancing security assessments
Network security assessment doesn't have to rely on expensive automated tools. In this tip, learn how to use data from freely available tools to produce a comprehensive view of network security. Continue Reading
-
August 16, 2007
16Aug2007
News
Voice over IPv6: Architectures for Next Generation VoIP Networks
VoIP technolgies are not immune to system failures, from hacking to jitter, and these issues can present problems for companies who depend on their network. This chapter examines some of the issues that are faced by VoIP systems, focusing on those ... Continue Reading
-
August 16, 2007
16Aug2007
Tip
Secure Cisco routers against IOS flaw attack
Learn how to secure Cisco routers against the recently announced Cisco IOS flaw, which could be exploited by hackers. Find out how to determine which routers are affected and ways to protect yourself from this vulnerability, including steps to ... Continue Reading
-
August 16, 2007
16Aug2007
News
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
-
August 16, 2007
16Aug2007
In Depth
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
August 15, 2007
15Aug2007
News
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
August 15, 2007
15Aug2007
News
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS. Continue Reading
-
August 15, 2007
15Aug2007
In Depth
Asterisk PBX solves enterprise's growing communication problem
An Asterisk-based PBX proved to be the solution to one enterprise's communications growing pains. Continue Reading
-
August 15, 2007
15Aug2007
Tip
How to test Snort
VARs should test Snort to ensure the open source IDS is detecting malicious activity. Continue Reading
-
August 14, 2007
14Aug2007
News
QoS -- What voice managers need to know
Quality of Service (QoS) technologies can be quite confusing between technical complexities and marketing jargon. In this tip, find out what voice managers need to know about QoS as it relates to VoIP. Continue Reading
-
August 14, 2007
14Aug2007
News
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite. Continue Reading
-
August 14, 2007
14Aug2007
News
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone. Continue Reading
-
August 14, 2007
14Aug2007
News
Telstra network build spurs new security plan
Telstra's experience constructing the Next G and Next IP networks has seen the telco evolve a new security strategy. Continue Reading
-
August 13, 2007
13Aug2007
News
Data backup copies overview
How do you choose a storage copy technology? The best choices usually involve need and cost, vendor support, and technological compatibility/longevity. Continue Reading
-
August 13, 2007
13Aug2007
News
EMC cashes in with VMware IPO
EMC officially spins off part of its server virtualization subsidiary to the tune of $1.1B. Analysts are hoping the windfall will lead to deeper storage partnerships. Continue Reading
-
August 13, 2007
13Aug2007
News
Fibre-optic networks: Access network design
Fibre-optic technology in access networks is expanding due to the demand for broadband. Learn about FTTX and passive optical networking (PON) systems. Continue Reading
-
August 13, 2007
13Aug2007
News
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
-
August 13, 2007
13Aug2007
News
Gartner security summit outlines 'Security 3.0'
Gartner has opened its Sydney Security Summit with a definition of Security 3.0. Continue Reading
-
August 12, 2007
12Aug2007
In Depth
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
August 12, 2007
12Aug2007
News
Implementing video on demand
Video on demand (VoD), in at least some of its potential service models, is perhaps the most challenging of all network applications. Implementation of VoD should be should be undertaken in three particular steps. Continue Reading
-
August 12, 2007
12Aug2007
News
IPv6 from 'CCNA Portable Command Guide', Chapter 25
IPv6, 'CCNA Portable Command Guide,' Chapter 25, explains IPv6 address assignment, static routes in IPv6, IPv6 ping, IPv6 tunnels and RIPng. Learn all you need to know to pass the IPv6 questions on your Cisco Certified Network Associate exam. Continue Reading
-
August 10, 2007
10Aug2007
News
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200. Continue Reading
-
August 09, 2007
09Aug2007
News
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide. Continue Reading
-
August 09, 2007
09Aug2007
News
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional ... Continue Reading
-
August 09, 2007
09Aug2007
News
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ... Continue Reading
-
August 09, 2007
09Aug2007
Tip
Upcoming wireless standards promise managed WLANs
Learn about two new IEEE standards, 802.11k and 802.11v, which aim to improve wireless the problems over overlapping wireless networks, in this tip. Continue Reading
-
August 09, 2007
09Aug2007
News
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced. Continue Reading
-
August 09, 2007
09Aug2007
News
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
-
August 09, 2007
09Aug2007
News
IT pros impede PCI, Sarbanes Oxley compliance
The biggest barrier to collaboration between IT and compliance professionals is the lack of understanding about risk and compliance issues by corporate IT, according to a survey. Continue Reading
-
August 09, 2007
09Aug2007
News
VeriSign employee data exposed in laptop theft
Current and former employees of VeriSign were exposed to potential data fraud when a laptop housing their information was stolen from the car of a former employee. Continue Reading
-
August 09, 2007
09Aug2007
News
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
-
August 09, 2007
09Aug2007
News
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files. Continue Reading
-
August 09, 2007
09Aug2007
News
Network navigation -- Chapter 6 of 'Microsoft Windows Vista Administration'
Microsoft introduced a new way to view and navigate a network with Windows Vista. This chapter from 'Microsoft Windows Vista Administration' examines such new network navigation tools as Network Map and Network Details. If you have several networks ... Continue Reading
-
August 08, 2007
08Aug2007
News
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without ... Continue Reading
-
August 08, 2007
08Aug2007
News
NAS management software specifications
Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ... Continue Reading
-
August 08, 2007
08Aug2007
News
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
-
August 08, 2007
08Aug2007
News
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
-
August 08, 2007
08Aug2007
News
EMC's RSA to acquire Tablus for data loss prevention
RSA, the security division of EMC Corp., said it planned to acquire Tablus, a maker of sensitive data scanning and classification tools and data protection software. Continue Reading
-
August 08, 2007
08Aug2007
News
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features. Continue Reading
-
August 08, 2007
08Aug2007
News
Mozilla to extend security in major Firefox update
The next version of Firefox will include new anti-phishing and anti-malware capabilities. Mozilla also plans to release a pair of fuzzing tools to detect Java, FTP and HTTP flaws. Continue Reading
-
August 08, 2007
08Aug2007
News
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading
-
August 08, 2007
08Aug2007
News
IP address depletion hastens IPv6 adoption
IPv4 IP address depletion is hastening the need to switch from IPv4 to IPv6. In this column, Loki Jorgenson explains where we are now in terms of IPv6 readiness and provides some insight on how much work network operators will face. Continue Reading
-
August 08, 2007
08Aug2007
News
WLANs require investment to yield benefits, study says
WLANs require strong investments in order to yield their benefits, according to a recent study by the Aberdeen Group. Continue Reading
-
August 08, 2007
08Aug2007
News
NAS gateway specifications
A NAS gateway offers file-based accesses to external storage on a disk array -- or a SAN, where users can take advantage of superior performance and reliability while maintaining a level of simplicity. Since storage is moved off of the NAS device, ... Continue Reading
-
August 08, 2007
08Aug2007
News
New iSCSI SAN/NAS box touts better performance
Agami's new low-end iSCSI SAN/NAS box is pricier than other scaled-down offerings, but has a few more high-end features Continue Reading
-
August 08, 2007
08Aug2007
News
NAS gateway purchase considerations
NAS gateways overcome the inherent limitations of scale and flexibility by utilizing externally connected storage as external standalone disk arrays. NAS storage capacity is typically expanded by simply adding more disks to the appliance, but this ... Continue Reading
-
August 07, 2007
07Aug2007
News
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is ... Continue Reading
-
August 07, 2007
07Aug2007
Tip
BT's SDK for do-it-yourself VoIP apps
BT's SDK takes the complexity out of VoIP application development. Continue Reading
-
August 07, 2007
07Aug2007
In Depth
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
August 07, 2007
07Aug2007
News
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line. Continue Reading
-
August 06, 2007
06Aug2007
In Depth
Disaster recovery and business continuity fundamentals
The importance of disaster recovery and business continuity planning has been underscored in the wake of Hurricane Katrina, the Avian flu and 9/11. As important as maintaining continuous communications in a disaster is staying connected when random,... Continue Reading
-
August 06, 2007
06Aug2007
News
Video networks: The fundamental structure
Video delivery, content network, IPTV, triple play -- these are just a few of the terms used today for video over broadband data networks. This concept of video networks is an increasing challenge, and like most network challenges, this one is ... Continue Reading
-
August 06, 2007
06Aug2007
In Depth
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
August 06, 2007
06Aug2007
News
NetApp revenues fall $61M short of forecast
NetApp announces that its revenues are down 15% from last quarter, blaming a continued decline in data storage spending. Continue Reading
-
August 06, 2007
06Aug2007
News
Researchers wrangle petabytes of data storage with NAS, tape
Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff. Continue Reading
-
August 06, 2007
06Aug2007
News
F5 buys Acopia for US$210M
F5 joins the storage market with the acquisition of file virtualisation switch company Acopia. Continue Reading
-
August 05, 2007
05Aug2007
News
Windows Vista, IPv6 lead to network performance problems
Windows Vista, which runs on parallel IPv6 and IPv4 protocol stacks, can create network performance problems when used with older routers. Continue Reading
-
August 05, 2007
05Aug2007
News
Understanding IMS (IP Multimedia Subsystem)
IMS (IP Multimedia Subsystem) is an emerging architectural framework, based on SIP and IP, for offering multimedia and VoIP services, as well as fixed mobile convergence. This tip explains exactly what the architecture behind IMS. Continue Reading
-
August 03, 2007
03Aug2007
News
Discovery of malware cesspool triggers attack fears
Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack. Continue Reading
-
August 02, 2007
02Aug2007
News
Users stand by NetApp -- For now
Users say their view of NetApp and its products hasn't been affected by news of a revenue shortfall, but some say the clock is ticking on new product features they'd like to see. Continue Reading
-
August 02, 2007
02Aug2007
News
Apple releases fixes for Mac OS X, iPhone vulnerabilities
Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone. Continue Reading
-
August 02, 2007
02Aug2007
News
VMware helps SRM make a comeback
Symantec's CommandCentral version 5.0 adds support for VMware, which experts say will breathe new life into a fading corner of the storage market. Continue Reading
-
August 02, 2007
02Aug2007
News
Security exec Moritz leaving CA
Ron Moritz will depart after five years as CA's chief security strategist. It's the latest in a string of issues that have called the company's strategy into question. Continue Reading
-
August 02, 2007
02Aug2007
News
Cisco network design certification gets update
Cisco has updated its professional network design certification, CCDP, to account for new levels of intelligence embedded in a service-oriented architecture. Continue Reading
-
August 02, 2007
02Aug2007
News
Cisco network design certification gets update
Cisco has updated its professional network design certification, CCDP, to account for new levels of intelligence embedded in a service-oriented architecture. Continue Reading
-
August 01, 2007
01Aug2007
News
Black Hat 2007: Vista users urged to beware of IPv6
A researcher warns that attackers could make trouble for Vista users by exploiting Teredo, an IPv6 tunneling tool enabled by default in the latest Windows OS. Continue Reading
-
August 01, 2007
01Aug2007
News
Black Hat 2007: VoIP security reaches tipping point
VoIP security is as bad today as it was a couple years ago, industry experts say. But PGP creator Phil Zimmermann thinks his new Zfone software will help turn the tide. Continue Reading
-
August 01, 2007
01Aug2007
News
Networking certification how-to
These networking certification steps focus on what materials you need, what practice tests are best, and what kind of schedule you should put in place in order to pass your exam and certify. If you are a nervous test-taker, these steps also cover ... Continue Reading
-
August 01, 2007
01Aug2007
News
Cisco knocks out Avaya as IP PBX heavyweight
IP PBX adoption is rising as Cisco and Avaya square off for market dominance. Continue Reading
-
August 01, 2007
01Aug2007
News
Users make iSCSI Sans with USB keys
Users say that Open-E's iSCSI San software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products. Continue Reading
-
August 01, 2007
01Aug2007
News
Black Hat 2007 preview: Blue Pill under scrutiny
Among the highlights at the year's most anticipated hacker event, vulnerability researchers will challenge Joanna Rutkowska's Blue Pill concept. They'll also pick apart flaws in VoIP, NAC and Web applications. Continue Reading
-
August 01, 2007
01Aug2007
News
Mozilla fixes two critical Firefox flaws
Firefox version 2.0.0.6 addresses critical flaws involving unescaped URLs passing to external programs and privilege escalation. Continue Reading
-
August 01, 2007
01Aug2007
News
Black Hat 2007: Researchers highlight new database attack method
At this week's hacker confab, expert penetration testers will demonstrate how cyberthieves can reach into corporate databases -- without exploiting a specific software flaw -- to steal credit card and Social Security numbers. Continue Reading
-
July 31, 2007
31Jul2007
Tip
Beyond Asterisk -- Other open source PBXs
Asterisk is the most widely known open source PBX, but other developers are making competitive products in the unified communications market. Learn more in this tip from Gary Audin. Continue Reading
-
July 31, 2007
31Jul2007
News
Attackers ultimately drive security market, analyst says
The security market is being driven by spam gangs, cyberthieves and other criminals bent on hacking into company and government databases to steal sensitive information. Continue Reading
-
July 31, 2007
31Jul2007
News
Security update fixes Yahoo Widgets flaw
Attackers could exploit a Yahoo Widgets flaw to run malicious code on compromised Windows computers, but a security update is available. Continue Reading
-
July 31, 2007
31Jul2007
News
Fixed-content data archiving products get a boost
Caringo, EMC and HDS spruce up their fixed-content data archiving products as buzz around compliance and legal discovery continues. Continue Reading
-
July 31, 2007
31Jul2007
News
Cisco knocks out Avaya as IP PBX heavyweight
IP PBX adoption is rising as Cisco and Avaya square off for market dominance. Continue Reading
-
July 31, 2007
31Jul2007
News
VoIP services spell trouble for telcos
The rise of VoIP is paving the way for companies that haven't traditionally sold voice services to do so. Telcos slow to move will be hard pressed to keep up Continue Reading
-
July 31, 2007
31Jul2007
News
Riverbed extends WAFS to laptops
Steelhead Mobile installs on workstations without an onsite appliance. Users say they'd like to see better integration between the mobile and data center versions of the product. Continue Reading
-
July 30, 2007
30Jul2007
News
New research promises denser disk drives
New research into "magnetic avalanches" offers insight into one cause of disk drive failure and could lead to breakthroughs in density, according to experts. Continue Reading