News
News Archive
-
December 07, 2006
07
Dec'06
NAS management software specifications
Network attached storage (NAS) appliances and gateways must be configured and managed using NAS management software that allows administrators to allocate space, manage RAID and storage behaviors, perform routine maintenance, and other tasks. ...
-
December 06, 2006
06
Dec'06
Microsoft to fix Visual Studio, Windows flaws
Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle.
-
December 06, 2006
06
Dec'06
Zero-day flaw found in Windows Media Player
Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week.
-
December 06, 2006
06
Dec'06
MP3 search site pushes spyware, watchdogs say
A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org.
-
December 05, 2006
05
Dec'06
New zero-day affects Microsoft Word
Microsoft confirmed reports of "limited" zero-day attacks and warned customers to be cautious when opening unsolicited Word attachments.
-
December 04, 2006
04
Dec'06
IBM to acquire compliance software firm
IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees.
-
December 04, 2006
04
Dec'06
Spam -- stop it at the network edge
Spam has become much more than just a nuisance; it can slow or crash the network. F5 recently added a module to its Big IP platform to stop spam at the network edge.
-
December 03, 2006
03
Dec'06
Security Bytes: Phishing worm spreads through MySpace
Round up of security news
-
November 30, 2006
30
Nov'06
Terrorists may target financial sites
The U.S. government is warning of an al-Qaida call for a cyberattack against online stock trading and banking Web sites
-
November 30, 2006
30
Nov'06
Symantec blames piracy for Veritas licensing snafu
Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect.
-
November 30, 2006
30
Nov'06
Oracle responds to security critics
Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware.
-
November 30, 2006
30
Nov'06
Video conferencing brings desktop VoIP, app sharing
Voice, video and Web conferencing vendor Genesys adds desktop VoIP and enhanced application sharing to its collaboration lineup.
-
November 30, 2006
30
Nov'06
Gartner: Existing business continuity plans will fail in a pandemic
Existing business continuity plans will not protect a company during an avian flu pandemic, says a Gartner analyst. Business continuity plans assume a geographically specific disaster, while a pandemic will strike everywhere nearly simultaneously.
-
November 29, 2006
29
Nov'06
Video conferencing brings desktop VoIP, app sharing
Voice, video and Web conferencing vendor Genesys adds desktop VoIP and enhanced application sharing to its collaboration lineup.
-
November 29, 2006
29
Nov'06
Multiple flaws in Adobe Reader, Acrobat
Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers.
-
November 29, 2006
29
Nov'06
Podcast: Security certifications pay could rebound in '07
Security certifications pay is languishing, according to skill and certifications pay expert David Foote of Foote Research. Foote examines the state of the IT security job market.
-
November 28, 2006
28
Nov'06
Symantec fixes NetBackup Puredisk flaw
An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available.
-
November 28, 2006
28
Nov'06
Adware targets Mac OS X
As F-Secure notes what may be the first example of adware designed for Macs, researcher LMH reports more flaws in the operating system as part of the Month of Kernel Bugs.
-
November 28, 2006
28
Nov'06
Effective wireless security is available, but holes exist
Specialist vendors offer products that allow even small businesses to run a secure wireless network without paying a high price, but that doesn't mean companies are using it.
-
November 28, 2006
28
Nov'06
Study: Some firms balk at mobile security
Companies are failing to safeguard sensitive data on employee mobile devices, according to a survey by the Business Performance Management Forum.
-
November 28, 2006
28
Nov'06
Apple fixes 22 Mac OS X flaws
The patches include a fix for a Wi-Fi flaw reported earlier this month as part of the Month of Kernel Bugs. A number of other flaws remain unfixed, however.
-
November 26, 2006
26
Nov'06
Static routing for Cisco users [Day Two: The good and bad of static routing]
What is static routing good for? And what are its shortcomings? Read on to discover how and when to use this technique.
-
November 26, 2006
26
Nov'06
Managed and hosted VoIP: muddling through
Managed and Centrex and hosted, oh my! For companies looking for an alternative to a premise-based phone system, there are plenty available, and they come in all shapes and sizes. Get a clearer understanding of exactly what's available so you can ...
-
November 26, 2006
26
Nov'06
Storage management tools get more flexible
After a decade of proprietary storage management tools, vendors are finally giving users more choices and freeing them up to buy only what they need.
-
November 26, 2006
26
Nov'06
Virtualisation buying guide [Day Two: Virtualisation software examined]
Deploying software on a server or dedicated appliance is often easier for smaller organisations, but the actual product choice demands careful consideration. Now that you've reviewed the essential issues involved in any virtualisation product, this ...
-
November 23, 2006
23
Nov'06
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers.
-
November 23, 2006
23
Nov'06
Commentary: We've never met a "thought follower"
A couple of days back, a vendor tried to convince us that their new security consultancy services should be of interest to you, our readers.
-
November 22, 2006
22
Nov'06
Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act.
-
November 21, 2006
21
Nov'06
New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days.
-
November 21, 2006
21
Nov'06
Skills gap grips India's budding storage market
India is the second fastest growth market for storage technology in Asia Pacific after China, according to IDC, but a skills shortage could hamper growth, experts say.
-
November 21, 2006
21
Nov'06
Virtual SAN purchase considerations
The specific considerations for key virtual SAN products plus a series of specifications to help make on-the-spot product comparisons between vendors.
-
November 21, 2006
21
Nov'06
Virtual SAN product specifications
Product snapshots that highlight key specifications for a cross-section of VSAN platforms selected based on input from industry analysts and SearchStorage.com editors.
-
November 21, 2006
21
Nov'06
BakBone brushes up replication software
BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine.
-
November 21, 2006
21
Nov'06
Long-term archiving needs better media, experts say
The hundred-year archive is coming soon, and industry watchers say a new physical medium for long-term storage should come with it.
-
November 21, 2006
21
Nov'06
Telecom overspending -- thwart it!
Research has found that telecom overspending is out of control, but a new batch of software is out there to help enterprises get a handle on their telecom billing.
-
November 21, 2006
21
Nov'06
Firefox, IE flaw could expose passwords
A flaw in Firefox 2.0 and IE could affect anyone visiting a Web site that allows user-contributed HTML codes to be added, according to Chapin Information Services.
-
November 20, 2006
20
Nov'06
Insider security threats come in many forms
Insiders could be the greatest threat to a company's security. The best defense is to let them know Big Brother is watching and a plan to deal with troublemakers.
-
November 20, 2006
20
Nov'06
BakBone NetVault upsets in Quality Awards, page 5
About the authors and the backup software survey.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards, page 3
Evaluating backup software products over the long haul: product reliability and repurchasing intentions.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards
This year's Diogenes Labs-Storage magazine Quality Awards for backup software had a come-from-behind winner: BakBone's NetVault.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards, page 4
The results for tech support and salesforce competence in backup software.
-
November 20, 2006
20
Nov'06
Backup software: BakBone upsets in Quality Awards, page 2
BakBone was the overall winner, but beaten out by CommVault in the product features category of our backup software Quality Awards.
-
November 19, 2006
19
Nov'06
Virtualisation: friend or foe? [Day Two: The virtual appliance]
Virtualisation slashes costs, makes management easier, unshackles software configurations from hardware. And it is being embraced around the world. But is it secure? In this three-part series, Patrick Gray explores the security implications of this ...
-
November 16, 2006
16
Nov'06
How can a small business achieve high quality VoIP?
As a small trader, I must be able to communicate with my trading partners who are often in other countries. We use IP telephony to keep costs down. Can you suggest how I can have high quality VoIP calls that will exceed PSTN call quality?
-
November 16, 2006
16
Nov'06
Why do VoIP calls remain active after the phone call is ended?
For our small business needs, we use a Linksys PAP for our IP telephony service. Sometimes though, we noticed that the call will remain active after we have ended the call and hung up. How do we configure the ATA or gateway to avoid this problem?
-
November 16, 2006
16
Nov'06
Why is UDP used more in VoIP than TCP?
If UDP is unreliable, why is it used more in VoIP rather than TCP?
-
November 16, 2006
16
Nov'06
What is the difference between VoIP, CTI and IP telephony?
What is the difference between VoIP, CTI (Computer Telephony Integration) and IP telephony?
-
November 16, 2006
16
Nov'06
Can VoIP work on a GPRS-enabled mobile phone?
Is it possible to use VoIP on GPRS-enabled mobile phones?
-
November 16, 2006
16
Nov'06
When should a VoIP system be analyzed and with what tools?
We have recently implemented a VoIP network with separate VLANs and QoS. It all seemed to be working fine when it first went in, but recently, certain people have been complaining about sound breakup whilst talking to customers on the phone.
-
November 16, 2006
16
Nov'06
VoIP news briefs: Verizon Business, TheInfoPro and Ovum
Verizon Business introduces a new management portal; TheInfoPro looks at the rate of VoIP adoption; and Ovum warns of VoIP security threats.