Archive
Browse the full archive of Computer Weekly online content - see our most recent articles listed below, or browse by year of publication.
2007 Stories
-
January 18, 2007
18Jan2007
News
How can click-to-dial (click-to-call) be enabled at remote offices?
We've just installed Mitel 3300's across three sites and are looking to complete click-to-dial (click-to-call) for users utilizing Outlook 2003. The calls will then be pushed out via a 5340 handset. We can achieve this locally from our main site, ... Continue Reading
-
January 18, 2007
18Jan2007
News
WAN/WAFS platform specifications
Product snapshots highlighting key specifications for a cross section of WAFS and WAN optimisation products intended for small, medium, and large organisations. Continue Reading
-
January 17, 2007
17Jan2007
In Depth
TJX gets little sympathy from blogosphere
TJX is taken to task by security bloggers for waiting until after a massive data breach to take steps to bolster its security. Continue Reading
-
January 17, 2007
17Jan2007
News
Companies take IM threats seriously
Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications Continue Reading
-
January 17, 2007
17Jan2007
News
Did TJX take the right steps after data breach?
Security experts are mixed on whether TJX acted properly following a massive data breach last month. One expert says potential victims should have been notified sooner. Continue Reading
-
January 17, 2007
17Jan2007
News
Data breach at TJX could affect millions
Retailer TJX Companies said a hacker gained access to its systems exposing the credit card data of millions of customers. Continue Reading
-
January 17, 2007
17Jan2007
In Depth
TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
-
January 17, 2007
17Jan2007
News
Reasons why enterprise networking and security roles must stay separate
Enterprise network managers are responsible for configuring and managing network devices, but should they be accountable for tasks that are typically handled by the information security team? Contributor Shon Harris examines why networking and ... Continue Reading
-
January 17, 2007
17Jan2007
News
VoIP security testing fundamentals
VoIP security testing fundamentals are discussed in this guide -- how to test a VoIP system, what tools to use, how to use fuzzing to test VoIP security. Continue Reading
-
January 16, 2007
16Jan2007
In Depth
EqualLogic CEO says IPO on the way
EqualLogic's CEO talks about the company's plans to go public, its intent to add 10 GigE to its products and why he thinks not all iSCSI products are created equal. Continue Reading
-
January 16, 2007
16Jan2007
News
Fortify Software to acquire Secure Software
The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said. Continue Reading
-
January 16, 2007
16Jan2007
News
Routing: Five common, easily avoided errors
Router configuration errors don''t have to take down your network. Learn five common routing mistakes -- and how to avoid them -- in this tip. Continue Reading
-
January 16, 2007
16Jan2007
News
Network security threats and answers, by industry
Michael Gregg offers network pros in various industries security advice and step-by-step solutions to help lock down the network. Continue Reading
-
January 15, 2007
15Jan2007
In Depth
PatchLink offers solid flaw management
PatchLink Update 6.3 is a solid solution to the enterprise patch management problem and demonstrates its true power in a Windows environment. Continue Reading
-
January 15, 2007
15Jan2007
News
Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks. Continue Reading
-
January 15, 2007
15Jan2007
News
Apere's IMAG 500 a tough sell
Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product. Continue Reading
-
January 14, 2007
14Jan2007
News
EMC, NetApp execs debate future of iSCSI
A discussion between an EMC and NetApp executive, via their blogs, has users and analysts debating: Will the "Year of iSCSI" ever really happen? Continue Reading
-
January 14, 2007
14Jan2007
News
Storage management software finalists
Find out who was selected as finalists in the storage management software category for our storage products of the year Continue Reading
-
January 11, 2007
11Jan2007
News
Oracle emulates Microsoft with advance patch notice
Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin. Continue Reading
-
January 11, 2007
11Jan2007
News
Network security -- Taking the layered approach
Network security is tricky business. In his new book Hack the Stack, author and security expert Michael Gregg outlines how to secure the network using the OSI model. Continue Reading
-
January 10, 2007
10Jan2007
News
Out-of-cycle Microsoft patch likely, experts say
Patch specialists and IT administrators were surprised Microsoft didn't fix much-publicised Word zero-day flaws Tuesday. But they don't fault the company for holding back. Continue Reading
-
January 10, 2007
10Jan2007
In Depth
WiMax clearing path to mainstream
A number of industry moves have made WiMax almost ready for the mainstream. But there's good news and bad news to consider before making the move. Continue Reading
-
January 10, 2007
10Jan2007
News
Colonial Williamsburg virtualizes with Acopia
The living history museum is designed to show customers the 18th century, but behind the scenes, the business is implementing tiered storage using 21st-century file virtualization. Continue Reading
-
January 10, 2007
10Jan2007
News
Sophos acquires Endforce to add NAC
Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software. Continue Reading
-
January 10, 2007
10Jan2007
News
Critical Apple flaw discovered in Mac OS X
Attackers can exploit the flaw remotely to compromise a user's system via the Safari Web browser. Continue Reading
-
January 09, 2007
09Jan2007
News
More users increase risk for Volkswagen AG
With 1.5 million users on the network, Volkswagen AG depends more than ever on strong ID and access management to safeguard intellectual property, according to its CISO. Continue Reading
-
January 09, 2007
09Jan2007
News
Remote flaw in Vista could earn finder $8,000
VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista. Continue Reading
-
January 09, 2007
09Jan2007
In Depth
Federal government pushes full-disk encryption
Businesses need to follow the federal government's lead in reducing data breaches by holding employees responsible and examining full-disk encryption (FDE) products. Continue Reading
-
January 09, 2007
09Jan2007
News
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error. Continue Reading
-
January 09, 2007
09Jan2007
News
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error. A well-defined change management process built around a ... Continue Reading
-
January 09, 2007
09Jan2007
News
EMC restructures SMB storage division
EMC's Insignia group, originally a separate business unit, has seen layoffs and a restructuring, but EMC says it has no plans to discontinue its SMB products. Continue Reading
-
January 08, 2007
08Jan2007
In Depth
Inside MSRC: Microsoft updates WSUSSCAN issue
Christopher Budd of the Microsoft Security Response Center is urging customers to deploy the latest versions of the Systems Management Server Inventory Tool for Microsoft Updates or Microsoft Baseline Security Analyzer to receive all the current ... Continue Reading
-
January 08, 2007
08Jan2007
News
Convergence, interoperability key in disaster planning
Convergence and interoperability are major factors in ensuring communications continuity in a disaster. Continue Reading
-
January 08, 2007
08Jan2007
News
Critical fixes for Excel, Outlook and Windows
Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical. Continue Reading
-
January 08, 2007
08Jan2007
News
Attackers hide malicious code using new method
Attackers have designed a new way to thwart virus signatures from antivirus vendors, says a new report. Continue Reading
-
January 08, 2007
08Jan2007
News
What is the difference between InfiniBand, SAS and iSCSI and where does each technology fit?
InfiniBand is an interface; just like Fibre Channel (FC) or Ethernet. As an interface, InfiniBand carries different protocols... Continue Reading
-
January 08, 2007
08Jan2007
News
What is the difference between virtualization switches and virtual SANs?
The word "virtualization" is thrown around so much that it's hard to always know what it means... Continue Reading
-
January 08, 2007
08Jan2007
News
Is an SMB environment too small for a SAN?
Almost any size business can benefit from some type of SAN -- or "network storage"; whether it's NAS, iSCSI-based IP storage or FC storage... Continue Reading
-
January 08, 2007
08Jan2007
News
What is the difference between SAN routing, channel extension and virtualization?
Some folks see SAN routing as just segmentation; some see it as protocol conversion; some see it as distance enablement. SAN routing really embraces all those... Continue Reading
-
January 08, 2007
08Jan2007
News
What has been the impact of storage virtualization on SAN deployments?
I really have not seen storage virtualization driving storage area network (SAN) deployment... Continue Reading
-
January 08, 2007
08Jan2007
News
How far apart can SAN locations be?
Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency... Continue Reading
-
January 08, 2007
08Jan2007
News
How are switches changing the way SANs are designed and managed?
There is more granularity in the device options today, allowing for more versatile device configuration... Continue Reading
-
January 08, 2007
08Jan2007
News
Storage area network FAQ audiocast
Don't have time to dig into the FAQ text now? Download the storage area network audiocast in MP3 format and listen in the car, at the gym -- wherever you want. Continue Reading
-
January 08, 2007
08Jan2007
News
How does IP storage differ from iSCSI, NAS and Fibre Channel?
Generically, IP storage involves any storage functionality that is leveraging TCP/IP as a network transport... Continue Reading
-
January 08, 2007
08Jan2007
News
What guidelines should our listeners use for oversubscribing or under subscribing?
Oversubscription has long been a contentious topic... Continue Reading
-
January 08, 2007
08Jan2007
News
When should I use a SAN vs. NAS or iSCSI?
It's often a matter of block vs. file... Continue Reading
-
January 08, 2007
08Jan2007
News
What are some best practices when it comes to designing a SAN?
First, design for growth. Next, design for maintenance, which may include... Continue Reading
-
January 08, 2007
08Jan2007
News
What's the difference between SONET/SDH, DWDM and OCx -- Why not just use TCP?
We live in a virtual world where most of us have network access in our homes -- the Internet -- which is a virtual network... Continue Reading
-
January 07, 2007
07Jan2007
News
Bug Briefs: OpenOffice vulnerable to attack
Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server. Continue Reading
-
January 07, 2007
07Jan2007
News
Brocade buys Silverback for 10 GigE acceleration chips
Adding another string to its bow, Brocade scoops up IP chip acceleration supplier Silverback Systems for an undisclosed sum. Continue Reading
-
January 07, 2007
07Jan2007
News
Microsoft nixes four patch bulletins
Eight security updates were originally scheduled for Patch Tuesday , but Microsoft has decided to hold back on half of them. Continue Reading
-
January 07, 2007
07Jan2007
News
NAC implementation slows as networking budgets grow
Network Access Control (NAC) implementations will decrease, despite growth in networking budgets. Continue Reading
-
January 04, 2007
04Jan2007
News
Adobe Reader users urged to upgrade
Adobe Reader 8 fixes serious flaws attackers could exploit for cross-site scripting and other attacks. Continue Reading
-
January 04, 2007
04Jan2007
In Depth
Why don't we have clustered FC block storage?
Is it odd that the industry has made such serious strides toward incorporating clustering concepts in both file-based storage and IP -based storage, but not Fibre Channel storage? Continue Reading
-
January 03, 2007
03Jan2007
In Depth
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Continue Reading
-
January 03, 2007
03Jan2007
News
Cisco bolsters security with IronPort buy
Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million. Continue Reading
-
January 03, 2007
03Jan2007
News
Cisco software vulnerable to attack
Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication. Continue Reading
-
January 03, 2007
03Jan2007
In Depth
Top Web security tips of 2006
Check out the top five Web security tips of 2006 to get advice on securing Internet Explorer, ISA Server and Radius and a set of tools designed to secure the Web browsing experience. Continue Reading
-
January 03, 2007
03Jan2007
News
Asterisk releases new software appliance
Asterisk, the open source PBX, yesterday released a new software appliance that it says can be implemented in 30 minutes or less. Continue Reading
-
January 03, 2007
03Jan2007
News
Information security market 2006 year in review
In part two of our two-part special edition of Security Wire Weekly, site editor Eric Parizo reveals his picks for top information security interviews of 2006. Audio clips in this program include Andrew Braunberg of Current Analysis; Johannes ... Continue Reading
-
January 02, 2007
02Jan2007
In Depth
Storage Outlook '07: In search of better data management
Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007. Continue Reading
-
January 02, 2007
02Jan2007
News
Security pros grumble over spam increase
Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action. Continue Reading
-
January 02, 2007
02Jan2007
News
Storage Outlook '07: In search of better data management
Brian Peterson, storage architect for a Midwest-based Fortune 100 company, says better data management and business processes will be the main goal in 2007. Continue Reading
-
January 01, 2007
01Jan2007
In Depth
Security pros glean insight from '06
Corporate acquisitions, an abundance of spam, and the White House's take on cybersecurity mark 2006. Continue Reading
-
January 01, 2007
01Jan2007
In Depth
Storage Outlook '07: Seeking better backups and archives
Tom Becchetti, senior infrastructure engineer for a major national financial services company, says compliance, backup and archiving will be top priorities in 2007. Continue Reading
-
January 01, 2007
01Jan2007
In Depth
Top 10 mobile tips of 2006
Review of the popular mobile technical tips of 2006 from our stable of mobile experts; Lisa Phifer, Craig Mathias, Daniel Taylor, Kevin Beaver and Robbie Harrell. Continue Reading
-
January 01, 2007
01Jan2007
In Depth
Top Windows server hardening tips of 2006
Check out the top Windows server hardening tips of 2006 for helpful advice on domain controller penetration testing, security tips for the Windows Server 2003 OS and more. Continue Reading