Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
March 20, 2007
20Mar2007
News
Symantec says fixing licensing portal top priority
Company officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November. Continue Reading
-
March 19, 2007
19Mar2007
News
Internet complexity, insecurity could stifle innovation, expert says
Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says. Continue Reading
-
March 19, 2007
19Mar2007
Tip
Network summarization -- Supernetting and wildcard masks
Supernetting allows one routing table entry to represent an aggregation of networks. Network engineers need to understand supernetting, how to read routes received from other providers and how to create an access list that references these multiple ... Continue Reading
-
March 19, 2007
19Mar2007
News
Power over Ethernet power consumption: The hidden costs
Power over Ethernet (PoE) has many advantages in a VoIP migration, but some companies overlook the amount of power needed to run PoE for VoIP and the costs and cooling requirements that come with it. Continue Reading
-
March 18, 2007
18Mar2007
In Depth
Mobile data services development trends in 2007
Darrell Jordan-Smith takes a look at new data services architectures and development tools emerging in 2007 and the ongoing development efforts of the Java Community and others. Continue Reading
-
March 18, 2007
18Mar2007
News
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007. Continue Reading
-
March 18, 2007
18Mar2007
News
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns. Continue Reading
-
March 18, 2007
18Mar2007
News
Cisco stamps on Brocade in Q4, Dell'Oro says
For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm. Continue Reading
-
March 18, 2007
18Mar2007
In Depth
Defending mobile devices from viruses, spyware and malware
The nature of threat vectors facing mobile devices, challenges and struggles related to keeping mobile devices secure and strategies Continue Reading
-
March 18, 2007
18Mar2007
News
VoIP security worries are plentiful, potent
VoIP creates a new set of security issues for your network, as expert Ed Skoudis explains. Continue Reading
-
March 18, 2007
18Mar2007
News
New gigabit standard: How fast is fast enough?
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are working on increasing this standard to potentially 40 ... Continue Reading
-
March 15, 2007
15Mar2007
News
Cisco buys WebEx for $3.2 billion
Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications. Continue Reading
-
March 15, 2007
15Mar2007
News
Open source IP telephony on hold?
Is open source telephony ready for your business? Read on to learn if it's the real deal. Continue Reading
-
March 15, 2007
15Mar2007
News
Carrier MPLS support for VoIP
Achieving QoS for reliable voice transmissions can be the biggest challenge of deploying VoIP. Multi-Protocol Label Switching (MPLS) might be the answer! Continue Reading
-
March 14, 2007
14Mar2007
In Depth
LexisNexis fights crime with storage
The document search company is offering a new data forensics service staffed by former federal agents and powered by commodity NAS. Continue Reading
-
March 14, 2007
14Mar2007
News
Podcast: Security360 - SOA, Web Services Security
ZapThink analyst Jason Bloomberg offers an overview of the security issues unique to SOA environments, while executives from SAP and Oracle discuss how they address SOA security in their software. Continue Reading
-
March 14, 2007
14Mar2007
News
Emulex launches storage virtualization appliance
Emulex has packaged a chip from its Aarohi acquisition into an appliance that could be a lower cost hardware platform for storage virtualization software products. Continue Reading
-
March 13, 2007
13Mar2007
News
NEC reveals HydraStor grid storage
NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication. Continue Reading
-
March 13, 2007
13Mar2007
News
What are some best practices for retaining data in a highly regulated business environment?
Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long... Continue Reading
-
March 12, 2007
12Mar2007
News
VoiceCon Spring 2007: More news from the show
Unified communications and VoIP were big topics at VoiceCon Spring 2007. Here are some news highlights from the show. Continue Reading
-
March 11, 2007
11Mar2007
News
Wi-Fi interference
In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs. Continue Reading
-
March 08, 2007
08Mar2007
News
Review: eGuardPost a B+ overall
eGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities. Continue Reading
-
March 08, 2007
08Mar2007
News
Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing. Continue Reading
-
March 07, 2007
07Mar2007
News
Microsoft cancels Patch Tuesday as DST looms
IT administrators who are struggling to apply all their daylight-saving time (DST) patches will get a break from Microsoft next week, as no new security fixes will be released. Continue Reading
-
March 07, 2007
07Mar2007
In Depth
Is RAID outdated?
I would suggest that perhaps it is time for us to retire RAID in its current form. Continue Reading
-
March 07, 2007
07Mar2007
News
Microsoft outlines software-centric VoIP, UC
Microsoft unveils its vision of a software-based VoIP system to enable unified communications. Continue Reading
-
March 07, 2007
07Mar2007
News
Symantec acquires automated risk assessment firm
Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up. Continue Reading
-
March 07, 2007
07Mar2007
News
Microsoft outlines software-centric VoIP, UC
Microsoft unveils its vision of a software-based VoIP system to enable unified communications. Continue Reading
-
March 06, 2007
06Mar2007
News
Tape restoration firm accelerates restores
National Data Conversion uses Index Engines technology to speed up tape restores for litigation. Continue Reading
-
March 06, 2007
06Mar2007
News
Cisco, IBM announce new unified communications platform
Cisco and IBM today announced a new unified communications platform that will allow users to access collaboration applications and tie together the capabilities of both companies' solutions. Continue Reading
-
March 06, 2007
06Mar2007
News
Unified communications translates to intelligent communications
Unified communications and its business benefits were the underlying themes of the keynote presentations yesterday at VoiceCon Spring 2007. Continue Reading
-
March 05, 2007
05Mar2007
News
Nortel switch release focuses on unified communications
Nortel today released two new switch series aimed at unified communications deployments. Continue Reading
-
March 05, 2007
05Mar2007
News
Nortel switch release focuses on unified communications
Nortel today released two new switch series aimed at unified communications deployments. Continue Reading
-
March 05, 2007
05Mar2007
Tip
VoIP security - problems inherited from data networking
VoIP security problems present a challenge for voice and network staff because IP telephony brings with it not only the security problems of data networks but also new, added threats specific to VoIP. In this tip, learn about the data network ... Continue Reading
-
March 04, 2007
04Mar2007
News
NetApp stokes midrange fires with new array
The FAS 3040 is a scaled down version of the 64-bit 3070 architecture; NetApp officials say more moves downmarket will follow. Continue Reading
-
March 04, 2007
04Mar2007
News
Unified Communications to dominate VoiceCon
Unified Communications will again be a major focus of VoiceCon Spring. Continue Reading
-
March 04, 2007
04Mar2007
News
WordPress upgrade fixes 'dangerous' flaw
Developers of the open source blogging platform WordPress say users should upgrade to version 2.1.2 immediately to address a "dangerous" security hole that was recently attacked. Continue Reading
-
March 04, 2007
04Mar2007
News
Buzz builds around data reduction for primary storage
Analysts predict that in-band compression offerings from StoreWiz, newly updated this week, are the first step toward a new wave of primary storage deduplication products. Continue Reading
-
March 04, 2007
04Mar2007
News
Expert: NAC not a network security cure-all
According to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry. Continue Reading
-
March 02, 2007
02Mar2007
News
Police force secures data with biometrics
Humberside Police has issued biometric USB drives among staff to maintain data security. Continue Reading
-
March 01, 2007
01Mar2007
News
Linksys, Gateway launch low-end NAS
Cisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers. Continue Reading
-
March 01, 2007
01Mar2007
In Depth
Black Hat RFID controversy has bloggers up in arms
This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. Continue Reading
-
February 28, 2007
28Feb2007
In Depth
PING with Mark Odiorne
Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritising security for senior management and keeping compliant. Continue Reading
-
February 28, 2007
28Feb2007
News
RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading
-
February 28, 2007
28Feb2007
In Depth
RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
-
February 28, 2007
28Feb2007
News
Can setting up a VPN help you get around blocked VoIP ports?
Can setting up a VPN help you get around blocked VoIP ports? Continue Reading
-
February 27, 2007
27Feb2007
News
McAfee fixes flaw in Mac antivirus software
Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available. Continue Reading
-
February 27, 2007
27Feb2007
News
'Worm' targets Sun Solaris Telnet flaw
Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet. Continue Reading
-
February 27, 2007
27Feb2007
News
Wireless security: IT pros warily watching mobile phone threats
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. Continue Reading
-
February 27, 2007
27Feb2007
News
High-end storage array specifications
The key specifications for a cross section of popular high-end disk storage array products. Continue Reading
-
February 27, 2007
27Feb2007
News
Black Hat presenter nixes RFID cloning demo under pressure
A demonstration of a device that could easily clone radio frequency identification (RFID) badges, was pulled from a conference presentation under pressure from a chip maker. Continue Reading
-
February 27, 2007
27Feb2007
News
Corel offers WordPerfect for free
Corel has made available a beta version of its WordPerfect Lightning software for free, in a bid to attract users into buying the advanced commercial version. Continue Reading
-
February 27, 2007
27Feb2007
News
Home Office to introduce new police database to fight gun crime
Home secretary John Reid has announced a new information database to help tackle increasing gun crime. Continue Reading
-
February 26, 2007
26Feb2007
In Depth
Outsourced VoIP helps devastated company recover
Outsourced VoIP helped a Berkeley company keep up business as usual after a fire destroyed its offices. Continue Reading
-
February 26, 2007
26Feb2007
News
Pilkington gets flexible with Infor
Pilkington, the global glass manufacturer, is poised to go live with Infor software designed to predict demand for its auto-glass aftermarket, after the firm found the required level of functionality was not available in its core enterprise resource... Continue Reading
-
February 26, 2007
26Feb2007
News
Sun scraps 6920 array, offloads support to HDS
The long-rumored deal that Sun will sell its 6920 virtualization array to HDS is done. But rather than developing the product, HDS will upgrade users to its TagmaStore instead. Continue Reading
-
February 26, 2007
26Feb2007
In Depth
RFID privacy, security should start with design
Companies planning to deploy radio frequency identification technology (RFID) must demand that privacy and security issues are addressed early. Continue Reading
-
February 26, 2007
26Feb2007
News
HP acquires clustered file system software maker PolyServe
HP announced its intent to acquire clustered file system maker PolyServe. Continue Reading
-
February 26, 2007
26Feb2007
News
Storm rages again: Self-morphing Trojan uses blogs to spread rootkits
A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments. Continue Reading
-
February 25, 2007
25Feb2007
News
Storage switch startup burns out, turns to security
The company formerly known as Maxxan has been rechristened CipherMax and is now marketing a storage switch/encryption appliance with one point of management. Continue Reading
-
February 25, 2007
25Feb2007
News
HP announces iSCSI VTL for SMBs
HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers. Continue Reading
-
February 25, 2007
25Feb2007
News
PatchLink acquires STAT Guardian tool
PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp. Continue Reading
-
February 25, 2007
25Feb2007
In Depth
Top 10 VoIP search terms
The top ten VoIP search terms and definitions. Keep tabs on the most popular VoIP terms – updated regularly. Continue Reading
-
February 25, 2007
25Feb2007
News
IP PBX: Ten reasons to switch
Should you throw out the old PBX and replace it with a new IP PBX? This tip from WindowsNetworking.com provides ten compelling reasons to do so. Continue Reading
-
February 25, 2007
25Feb2007
News
Does an organization have to have an IP PBX in order to have a unified communications system?
Does an organization have to have an IP PBX in order to have a unified communications system? Continue Reading
-
February 25, 2007
25Feb2007
News
Gartner: Quad-core slowed 2006 server sales
New Gartner data suggests that quad-core servers are not exciting users. Continue Reading
-
February 22, 2007
22Feb2007
In Depth
Microsoft takes a blogosphere beating over Vista UAC
This week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature. Continue Reading
-
February 22, 2007
22Feb2007
News
Google offers 10 GB inbox
The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version. Continue Reading
-
February 22, 2007
22Feb2007
In Depth
Flaws haunt Symantec, IBM, Cisco and IE
Bug Briefs: Security holes plague Symantec Norton products, IBM DB2; Mozilla Firefox; Trend Micro ServerProtect; Cisco IP phones; Google Desktop; IE and Snort. Continue Reading
-
February 21, 2007
21Feb2007
News
Cisco warns of IP phone flaws
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. Continue Reading
-
February 21, 2007
21Feb2007
In Depth
Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading
-
February 20, 2007
20Feb2007
News
Cisco routers threatened by drive-by pharming
Millions of Cisco routers in circulation could be compromised by a newly-discovered attack technique Symantec calls drive-by pharming, the networking giant warned in an advisory. Continue Reading
-
February 20, 2007
20Feb2007
News
Cisco to acquire Reactivity for $135 million
One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities. Continue Reading
-
February 20, 2007
20Feb2007
News
Microsoft confirms new IE flaw
Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday. Continue Reading
-
February 20, 2007
20Feb2007
News
Google plugs dangerous flaw
An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it. Continue Reading
-
February 20, 2007
20Feb2007
News
TJX data breach worse than initially feared
Hackers had access to a larger amount of customer data, TJX executives said in a statement. Continue Reading
-
February 20, 2007
20Feb2007
News
All about automation
Automating your IT operations is a trick that creates obvious benefits. In this article, we explain how data center automation can help an entire enterprise. Continue Reading
-
February 19, 2007
19Feb2007
News
Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Continue Reading
-
February 19, 2007
19Feb2007
News
When security firms merge, some users are losers
Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold. Continue Reading
-
February 19, 2007
19Feb2007
News
Quiz: Compliance improvement -- Get better as you go forward
A five-question multiple-choice quiz to test your understanding of the content presented by expert Richard Mackey in this lesson of SearchSecurity.com's Compliance School. Continue Reading
-
February 19, 2007
19Feb2007
News
What is presence?
Presence technology makes it possible to locate and identify a computing device wherever it might be, as soon as the user connects to the network. Continue Reading
-
February 19, 2007
19Feb2007
News
What is unified communications?
Defining unified communications. Continue Reading
-
February 19, 2007
19Feb2007
News
What is communication-enabled-business processes (CEBP)?
Defining communication-enabled business processes. Continue Reading
-
February 18, 2007
18Feb2007
News
CDP platform purchase considerations
Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write ... Continue Reading
-
February 15, 2007
15Feb2007
In Depth
Questions fly as EMC Retrospect fades
All signs point to the end of life for EMC's Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel. Continue Reading
-
February 15, 2007
15Feb2007
News
News Wrap 2.0
We've just discovered a great new application for technology that can save you an incredible amount of time, money and heartache. Continue Reading
-
February 14, 2007
14Feb2007
News
VoIP complexities stall implementation for SMBs
VoIP sales in the SMB market are predicted to lead revenue in the next several years, but most SMBs are confused by the number of different solutions. Continue Reading
-
February 14, 2007
14Feb2007
News
Cancer clinic juggles two-tiered storage environments
Karmanos Cancer Institute is using two separate tiered storage systems from EMC and Sun, and says it has yet to find a single storage vendor that can meet all its requirements. Continue Reading
-
February 14, 2007
14Feb2007
News
New attack technique threatens broadband users
Millions of broadband users across the globe are threatened by a new attack technique called drive-by pharming Continue Reading
-
February 14, 2007
14Feb2007
News
Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is ... Continue Reading
-
February 13, 2007
13Feb2007
In Depth
Inside MSRC: Microsoft explains security bulletins
Microsoft issued 12 new security bulletins in February. Christopher Budd of the Microsoft Security Response Center provides information about the most important fixes. Continue Reading
-
February 13, 2007
13Feb2007
News
Fortune 500 firm takes a crack at data classification
A life sciences company undertakes a data classification project with Abrevity and discovers the job is never done. Continue Reading
-
February 12, 2007
12Feb2007
News
Siemens' acquisition of UGS 'will benefit users'
-
February 12, 2007
12Feb2007
News
Mobile carriers admit to malware attacks
Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. Continue Reading
-
February 12, 2007
12Feb2007
News
Microsoft fixes zero-day flaws in Word, Office
Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office. Continue Reading
-
February 12, 2007
12Feb2007
In Depth
Download SAN Guide Chapter 3: Switches (PDF)
You asked for it, so here it is -- a printable version of our SAN All-In-One Guide. Download Chapter 3: Switches in .pdf format now. Continue Reading
-
February 12, 2007
12Feb2007
News
Skype makes more enterprise inroads
Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise. Continue Reading
-
February 11, 2007
11Feb2007
News
VoIP helps ensure disaster recovery
VoIP bolsters your disaster recovery plans and should be at the core of any well-planned disaster recovery strategy. Continue Reading
-
February 11, 2007
11Feb2007
News
Cybersecurity czar signals government cooperation at RSA Conference
Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats. Continue Reading
-
February 11, 2007
11Feb2007
News
Solaris 10 has zero-day Telnet flaw
Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn. Continue Reading