Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
May 03, 2007
03May2007
News
Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School. Continue Reading
-
May 03, 2007
03May2007
News
Network waste to reach $100 billion
Network overspending will cost enterprises more than $100 billion over the next five years, according to recent predictions by Gartner Inc. Continue Reading
-
May 03, 2007
03May2007
News
Microsoft users sticking with third-party security vendors
IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors. Continue Reading
-
May 02, 2007
02May2007
News
Microsoft to release DNS patch Tuesday
In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk. Continue Reading
-
May 02, 2007
02May2007
Tip
OSI: Securing the Stack, Layer 8 -- Social engineering and security policy
Network security is essential at every layer of the OSI model, including the mythical eighth layer, where users interact with technology. Since hackers can use social engineering to exploit people, it is important to train your users and implement ... Continue Reading
-
May 01, 2007
01May2007
News
IM slang glossary
-
April 29, 2007
29Apr2007
News
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Continue Reading
-
April 26, 2007
26Apr2007
News
New image spam sneaks into inboxes
Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes. Continue Reading
-
April 26, 2007
26Apr2007
News
Websense to acquire SurfControl
Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market. Continue Reading
-
April 25, 2007
25Apr2007
News
NetApp VP says storage virtualization overrated
NetApp's vice president of emerging products, Jay Kidd, discusses storage virtualization, competition with Isilon and NetApp's current identity crisis. Continue Reading
-
April 24, 2007
24Apr2007
News
Scaling storage networks demands careful consideration
In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ... Continue Reading
-
April 24, 2007
24Apr2007
In Depth
IP storage switch and router specifications
Key specifications for a cross section of popular IP storage switch and router products. Continue Reading
-
April 24, 2007
24Apr2007
In Depth
Storage consolidation: WAN acceleration and WAFS technology overview
One important avenue of storage consolidation is the consolidation of remote office storage; this is where WAN acceleration and WAFS technology comes into play. Continue Reading
-
April 24, 2007
24Apr2007
In Depth
Storage consolidation: SRM tools overview
SRM tools are an important part of storage consolidation. They allow admins to monitor the storage environment, allocate and organise available storage, and offer insights into future trends. Continue Reading
-
April 24, 2007
24Apr2007
In Depth
IP storage switch and router purchase considerations
The choice of an IP switch or router demands careful consideration of issues including port speed, segmentation, interoperability and security Continue Reading
-
April 24, 2007
24Apr2007
News
Apple fixes 25 Mac OS X flaws
Attackers could exploit about two dozen flaws in Mac OS X to cause a denial of service, bypass security restrictions, disclose sensitive data and run malicious code. Continue Reading
-
April 24, 2007
24Apr2007
News
Hitachi launches 1 TB SATA disk drive
Hitachi has taken the wraps off three new products: a 1 TB enterprise SATA disk drive, a 2.5-inch SAS drive and a 300 GB multi-interface drive. Continue Reading
-
April 23, 2007
23Apr2007
Tip
What can we do to connect our wireless router to our wireless client?
Experiencing a persistent inability to connect a wireless router from your wireless client? Lisa Phifer details how to fix this problem. Continue Reading
-
April 23, 2007
23Apr2007
News
Weekly compilation of storage news:Dell LTO-4 drive, new Sun array
Dell is first out of the gate with the new LTO-4 drive, which offers native encryption; Sun unveils new array and deepens its relationship with FalconStor. Continue Reading
-
April 20, 2007
20Apr2007
News
Disaster Recovery Planning Podcasts
DR expert Jon Toigo explains how the new realities of business make DR planning an essential element of daily IT process, procedure, product development and procurement. Continue Reading
-
April 20, 2007
20Apr2007
News
Convergence certification provides evaluation standard
CompTIA has developed a convergence certification, designed to validate qualified convergence professionals. Continue Reading
-
April 19, 2007
19Apr2007
Tip
VLANs -- Controlling wired and wireless traffic
Today, most business networks rely on virtual LANs (VLANs) to partition Ethernets and control the destinations reached by each worker. As users begin to shift between Ethernet and Wi-Fi throughout the work day, it makes sense to apply VLANs to both ... Continue Reading
-
April 19, 2007
19Apr2007
In Depth
Skype to the desk phone saves company a bundle
Skype on the desk phone has helped a Chicago-based furniture maker save a considerable amount of money on long-distance voice charges. Continue Reading
-
April 18, 2007
18Apr2007
News
How do I calculate the time taken for a file to be transferred over a WAN link?
Calculate the time it will take for a file to transfer over a WAN link with the help of Dr. Hughes in this expert response. Continue Reading
-
April 18, 2007
18Apr2007
News
Convergence certification provides evaluation standard
Voice and data convergence are more prevalent and enterprises are looking for certified professionals to administer the combined networks -- leading CompTIA to develop its Convergence+ certification, designed to validate qualified convergence ... Continue Reading
-
April 17, 2007
17Apr2007
News
SNW: Users wary of outsourcing backup
Symantec unveiled plans for outsourced, online data backup services this week, but users at Storage Networking World are more cautious than ever about letting go of their data. Continue Reading
-
April 17, 2007
17Apr2007
News
Storage consolidation: Disks and disk subsystems overview
Any storage consolidation effort must involve a serious consideration of disk subsystems and the specific disk types that those systems will contain Continue Reading
-
April 16, 2007
16Apr2007
News
Storage consolidation: Weighing the pros and cons
Storage consolidation holds out the promise of more efficient storage management. But pitfalls include slower network performance and a difficult data migration process. Continue Reading
-
April 16, 2007
16Apr2007
In Depth
Inside MSRC: Windows Vista security update explained
Microsoft's Christopher Budd details the first Windows Vista security updates. Continue Reading
-
April 16, 2007
16Apr2007
News
EMC, Symantec to enter Software as a Service market
EMC has plans to release Software as a Service (SaaS) products for data backup and archiving; Symantec announces a new online backup service. Continue Reading
-
April 16, 2007
16Apr2007
News
DNS worm strikes at Microsoft flaw
A new worm called Rinbot.BC exploits the Microsoft DNS flaw by installing an IRC bot on infected machines and scanning for other vulnerable servers. Continue Reading
-
April 16, 2007
16Apr2007
News
How is SIP winning favor over H.323?
What are the similarities, differences and major reasons between SIP and H.323. And why is one winning? Continue Reading
-
April 16, 2007
16Apr2007
News
How does file archiving differ from email and database archiving or document management systems?
The thing they all have in common is "archiving" -- long-term storage and preservation of data that's inactive... Continue Reading
-
April 15, 2007
15Apr2007
News
Malware outbreak 'largest in almost a year'
Security firm Postini and the SANS Internet Storm Center said they are tracking a significant malware outbreak. Postini calls it the biggest email attack in almost a year. Continue Reading
-
April 12, 2007
12Apr2007
News
Microsoft DNS server flaw called dangerous
UPDATE: Microsoft said Sunday that attacks are still limited, but a proof of concept code to exploit the vulnerability is publicly available. Continue Reading
-
April 12, 2007
12Apr2007
News
Microsoft investigates DNS server flaw
Attackers could exploit a DNS flaw in Microsoft Windows 2000 Server and Windows Server 2003 and run malicious code on the system. A workaround is suggested until a patch is issued. Continue Reading
-
April 12, 2007
12Apr2007
???archiveContentType.misc_content???
Weatherproof VoIP phone
Gai-Tronics weatherproof VoIP telephones offer direct connection to LAN or WAN via RJ45 connector, including power-over-ethernet (PoE) as standard. Continue Reading
-
April 11, 2007
11Apr2007
News
Architectural firm swaps online data backup service providers
As online data backup services take off, one early adopter slashed costs dramatically by switching to a newer service on the market. Continue Reading
-
April 11, 2007
11Apr2007
News
Instant messaging threats become more sophisticated
Instant messaging faces greater threats as more enterprises begin to utilize it, making it a more appealing target to hackers. Continue Reading
-
April 11, 2007
11Apr2007
Blog Post
Letter from 79 doctors, nurses and secretaries over go-live of NHS IT system
This is a letter signed by 79 doctors, nurses and secretaries at Milton Keynes General Hospital regarding the implementation of a Care Records Service under the NHS's National Programme for IT ... Continue Reading
-
April 11, 2007
11Apr2007
Tip
ISCSI for beginners
iSCSI is an Internet Protocol (IP)-based storage networking standard for linking data storage facilities. Learns the basics in this fast guide. Continue Reading
-
April 10, 2007
10Apr2007
News
Emulex stands alone with FC-SATA switch
Emulex has released an embedded storage switch based on the newly approved FC-SATA standard, but it's unclear if any other companies in the industry are on the bandwagon. Continue Reading
-
April 10, 2007
10Apr2007
News
The changing threat of email attacks
In this Messaging Security School lesson, expert Mike Rothman details the state of next-generation email threats, explores reputation systems and uncovers threats AV can't catch. Continue Reading
-
April 10, 2007
10Apr2007
News
Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilisation of storage resources. Continue Reading
-
April 10, 2007
10Apr2007
News
Capacity planning software specifications
Gauging storage needs over time is one of the biggest challenges faced by IT administrators, and a new generation of capacity planning tools is emerging to help forecast growth and utilization of storage resources, and even perform predictive ... Continue Reading
-
April 10, 2007
10Apr2007
News
Capacity planning tools require serious purchase consideration
Capacity costs money, and new disk acquisitions stand out as a notable part of every IT budget. The trick is to match new capacity with actual storage needs. Gauging storage needs over time is one of the biggest challenges faced by IT administrators... Continue Reading
-
April 09, 2007
09Apr2007
News
HP renews SMB storage campaign
With the launch of the new All-in-One 1200 and the shifting of executives to a new SMB business unit, HP is focused on its low-end products in an effort to boost growth. Continue Reading
-
April 08, 2007
08Apr2007
News
Spam campaign uses Storm-like attack technique
Spammers used an attack technique much like last January's "Storm" assault to dupe people into downloading malware over the weekend. This time, they used fake WWIII headlines. Continue Reading
-
April 08, 2007
08Apr2007
News
Symantec fixes 'high-risk' flaw in Enterprise Security Manager
Attackers could hijack machines from remote locations by exploiting a flaw in Symantec Enterprise Security Manager (ESM). Kaspersky Lab users also have a flaw to deal with. Continue Reading
-
April 08, 2007
08Apr2007
News
How data deduplication eases storage requirements
Storage administrators are struggling to handle spiraling volumes of documents, audio, video, images and large email attachments. Adding storage is not always the best solution, and many companies are turning to data reduction technologies such as ... Continue Reading
-
April 05, 2007
05Apr2007
News
Goldman Sachs: Interest in NetApp SAN products wanes
A survey by the investment firm shows enterprise storage buyers had a declining interest in NetApp SAN products over the last year. Continue Reading
-
April 04, 2007
04Apr2007
News
Storage vendors propose FC over Ethernet standard
A group of nine storage vendors led by Emulex is proposing a Fibre Channel over Ethernet (FCoE) standard . Continue Reading
-
April 04, 2007
04Apr2007
News
Wireless VoIP market to grow rapidly
VoIP and Voice over Wi-Fi markets are expected to be strong in 2007 and remain so through 2012. Continue Reading
-
April 04, 2007
04Apr2007
News
Data security breach at UCSF may have exposed thousands
The University of California at San Francisco (UCSF) acknowledged Wednesday that a security hole in a computer server may have exposed 46,000 people to potential identity fraud. Continue Reading
-
April 04, 2007
04Apr2007
In Depth
When disaster recovery and data classification collide
Attendees at a disaster recovery seminar discussed the complex application dependencies when disaster recovery and data classification combine. Continue Reading
-
April 01, 2007
01Apr2007
News
Spam poses as Internet Explorer 7 download
Beware of emails from "[email protected]." It may look like an invitation to download Internet Explorer 7, but it's really a trick to infect machines with malware. Continue Reading
-
April 01, 2007
01Apr2007
News
Microsoft releases patch for Windows ANI flaw
Security companies are seeing massive attacks against the Windows ANI zero-day flaw, prompting Microsoft to rush out a fix a week before Patch Tuesday. Continue Reading
-
April 01, 2007
01Apr2007
News
News Wrap 2.0
TechTarget ANZ's slightly skewed look at this weeks news. Continue Reading
-
April 01, 2007
01Apr2007
News
Network security, content security markets to grow in 2007
The network security appliance and software markets are expected to continue growing steadily in 2007, while content security sales will begin to affect most enterprises' networking budgets. Continue Reading
-
March 29, 2007
29Mar2007
In Depth
Will data breach be the end of TJX?
This week in Security Blog Log: Industry experts say companies can learn from a data breach and even prosper from it. But is TJX following the right example? Continue Reading
-
March 29, 2007
29Mar2007
News
VoIP network monitoring improves VoIP deployment
VoIP network monitoring and pre-deployment analysis are becoming more important as VoIP application overlay becomes denser Continue Reading
-
March 28, 2007
28Mar2007
News
Enterprise switch upgrade specifications
Product snapshots highlighting key specifications for a cross section of popular enterprise-class switch products. Continue Reading
-
March 28, 2007
28Mar2007
Tip
How do I get my LAN computers to reach the Internet?
Get your LAN computers to reach the Internet in this response from wireless expert Lisa Phifer. Continue Reading
-
March 28, 2007
28Mar2007
Tip
What are the criteria for evaluating an indoor wireless network?
In this Q&A., learn how to evaluate an indoor wireless network with criteria provided by expert Lisa Phifer. Continue Reading
-
March 27, 2007
27Mar2007
News
Storage newcomers fight uphill battle
Gresham is newly marketing its VTL product to mixed U.S. reviews, and Australian file management player Moonwalk is inching its way onto U.S. radar screens. Continue Reading
-
March 27, 2007
27Mar2007
In Depth
IT pros eye Windows Server 2003 SP2 with caution
Despite its security and stability enhancements, IT pros say they are in no rush to deploy Windows Server 2003 SP2 Continue Reading
-
March 27, 2007
27Mar2007
News
Compellent adds boot from SAN consolidation
Update saves storage space by consolidating boot volumes into a "golden" copy of the OS, but experts are troubled by a lack of partnerships with server and OS vendors. Continue Reading
-
March 27, 2007
27Mar2007
News
VoIP's inherited data security problems
VoIP security problems present a challenge for voice and network staff. This article explains how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel. Continue Reading
-
March 26, 2007
26Mar2007
News
Should I use data deduplication to manage unstructured data?
Absolutely; there are two areas where data deduplication, or single-instance storage, can help... Continue Reading
-
March 26, 2007
26Mar2007
News
What are some of the other options available to help manage unstructured data?
Eliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data entirely... Continue Reading
-
March 26, 2007
26Mar2007
News
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management... Continue Reading
-
March 26, 2007
26Mar2007
News
What is unstructured data and how is it different from structured data in the enterprise?
What we're really doing is designating our data as structured or unstructured. Let's start with structured data... Continue Reading
-
March 26, 2007
26Mar2007
News
What is the impact of unstructured data on backup and restore and disaster recovery in general?
As data volumes grow, there's a bigger problem meeting recovery time objectives. We depend on our data, and we have set recovery times for our systems that are zero (no downtime) in some cases, though most companies set recovery times from eight to ... Continue Reading
-
March 26, 2007
26Mar2007
News
What are some of the biggest challenges with unstructured data?
By far, the volume of data has to be the biggest challenge... Continue Reading
-
March 26, 2007
26Mar2007
News
Web 2.0: CIOs want it their way
A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors. Continue Reading
-
March 26, 2007
26Mar2007
News
Metasploit Framework 3.0 released
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing. Continue Reading
-
March 26, 2007
26Mar2007
News
How can a company set retention policies with such a glut of unstructured data?
It depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, business continuity planning, Sarbanes-Oxley compliance and data security... Continue Reading
-
March 26, 2007
26Mar2007
News
How is unstructured data affecting storage administrators and other staff?
There is absolutely an effect. Additional data volume translates into... Continue Reading
-
March 26, 2007
26Mar2007
News
Are there regulatory compliance issues related to unstructured data?
The most important issue is legal discovery. You may not know what you have or how to find it, so it can be very difficult to find the files that may be required by a court of law... Continue Reading
-
March 26, 2007
26Mar2007
News
What are some of the hidden costs of managing unstructured data?
-
March 26, 2007
26Mar2007
News
IP communications tools boost productivity, sales
IP communications tools have opened up several possibilities for one North American company, giving it presence awareness and unified messaging. Continue Reading
-
March 26, 2007
26Mar2007
Tip
Should I use data deduplication to manage unstructured data?
Absolutely; there are two areas where data deduplication, or single-instance storage, can help... Continue Reading
-
March 25, 2007
25Mar2007
News
Microsoft investigates Windows Vista Mail flaw
Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating. Continue Reading
-
March 25, 2007
25Mar2007
News
EMC CEO tips hat on future storage plans
At a media event in Sydney, EMC CEO, Joe Tucci said the company is working on storage tuned to the needs of Web 2.0 apps and also plugged the company's deduplication product. Continue Reading
-
March 25, 2007
25Mar2007
News
Basic VoIP network setup
Basic VoIP network setup advice. Continue Reading
-
March 25, 2007
25Mar2007
News
Why is VoIP authentication essential?
VoIP authentication advice. Continue Reading
-
March 25, 2007
25Mar2007
News
VoIP protocols
VoIP protocols -- the strengths and weaknesses of each. Continue Reading
-
March 22, 2007
22Mar2007
In Depth
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show. Continue Reading
-
March 22, 2007
22Mar2007
News
Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox. Continue Reading
-
March 22, 2007
22Mar2007
News
Mozilla releases Firefox fix
One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11. Continue Reading
-
March 22, 2007
22Mar2007
News
Midrange storage array purchase considerations
A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot product comparisons between v Continue Reading
-
March 22, 2007
22Mar2007
News
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products. Continue Reading
-
March 22, 2007
22Mar2007
News
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes. Continue Reading
-
March 21, 2007
21Mar2007
In Depth
Symantec threat report under the microscope
This week in Security Blog Log: Infosec professionals dissect Symantec's latest threat report and express a range of views in the blogosphere. Continue Reading
-
March 21, 2007
21Mar2007
In Depth
Web 2.0 tools of the trade
As Web 2.0 technologies become more popular, IT professionals are answering questions from business units on how it can be used. Continue Reading
-
March 21, 2007
21Mar2007
News
Storage Security FAQ audiocast
Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can download the entire presentation or the individual questions that you are most interested in. Continue Reading
-
March 21, 2007
21Mar2007
In Depth
Measuring Vista's true security muscle will take time
Researchers are digging through the Windows Vista code right now, and when they find flaws we'll hear about it. But it's the ones we don't hear about that should keep us up at night. Continue Reading
-
March 21, 2007
21Mar2007
News
Hackers broaden reach of cross-site scripting attacks
An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet. Continue Reading
-
March 21, 2007
21Mar2007
News
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show. Continue Reading
-
March 20, 2007
20Mar2007
News
NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it. Continue Reading