News
News Archive
-
October 26, 2004
26
Oct'04
Clear double advantage
ClearSpeed Technology has doubled the performance of its high-performance computing co-processor for scientific workstations and...
-
October 18, 2004
18
Oct'04
Smaller companies installing SP2; larger firms not
-
October 08, 2004
08
Oct'04
First integrated children's system goes live
The first web-based system to help councils meet new legal requirements for information sharing among teachers, social workers...
-
October 04, 2004
04
Oct'04
Symantec offers bare metal restore software
-
October 03, 2004
03
Oct'04
Training for CISSP Certification: SearchSecurity.com's Security School
Study guides for each of the ten domains of the CBK for those preparing to take the CISSP exam or expanding their knowledge of security concepts and practices.
-
September 27, 2004
27
Sep'04
Fast Guide: iSCSI
If you need to come up to speed rapidly on iSCSI, you've come to the right place. In this Fast Guide, we touch upon the basics and then we walk you through the pros and cons of iSCSI and Fibre Channel.
-
September 27, 2004
27
Sep'04
Five steps to using the Kerberos protocol
This excerpt from "Windows Server 2003 security infrastructures" explains the basic Kerberos protocol as it is defined in RFC 1510.
-
September 26, 2004
26
Sep'04
Authorize.Net says it has 'learned' from attack
The credit card processing service was unprepared for the kind of attack it suffered last week, but it will use the experience to improve security.
-
September 23, 2004
23
Sep'04
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets.
-
September 22, 2004
22
Sep'04
Security Bytes: New .jpg attack imminent; CA agrees to pay $225 million for federal violations
Sanjay Kumar is indicted for securities fraud and conspiracy, while Authorize.Net is knocked offline by massive DDoS attacks.
-
September 21, 2004
21
Sep'04
Survey shows SOX bringing IT, business together
-
September 19, 2004
19
Sep'04
Hackers costing enterprises billions
Symantec's semi-annual Internet Threat Report finds hackers continued adding billions to the cost of doing business on the Internet.
-
September 17, 2004
17
Sep'04
Swansea strike battle to go to Acas
Swansea Council and its striking IT staff are set to go to arbitration service Acas to settle a six-week dispute over a proposed...
-
September 01, 2004
01
Sep'04
Security Bytes: MySQL upgrade urged to fix flaw
Internet turns 35; federal computers used as spam relays; XP SP2 a bigger pain for smaller companies.
-
August 27, 2004
27
Aug'04
Over-specify when buying low cost replacement for Frame Relay
A project manager reveals how a VPN saved £275,000 a year
-
August 24, 2004
24
Aug'04
Latest worm uses IM to lure victims
A version of the worm which spread from infected Microsoft Internet Information Services (IIS) web servers in June has been...
-
August 03, 2004
03
Aug'04
Apple's SAN file system turns heads
-
July 28, 2004
28
Jul'04
Automated SQL injection: What your enterprise needs to know
The second of a two-part interview with SPI Dynamics CTO Caleb Sima tells what you should fear, why and what you can do to mitigate your risk.
-
July 27, 2004
27
Jul'04
New attacks and vulnerability trends highlighted at Black Hat
Presentations beginning today will analyze vulnerabilities, zero-day code, phishing and secure wireless deployment, among many other topics.
-
July 26, 2004
26
Jul'04
Fewer IT supplier conflicts are going to court
Law firms have reported a sharp fall in the number of IT disputes reaching the courts over the past 12 months as more users turn...
-
July 25, 2004
25
Jul'04
Know Your Enemy -- Learning about Security Threats: Chapter 8, Legal Issues
Find out more about the legal issues swirling around the use of Honeypots.
-
July 25, 2004
25
Jul'04
Learning about Security Threats: Profiling
A look at what it means to be a hacker.
-
July 18, 2004
18
Jul'04
Debian fixes multiple flaws
Denial-of-service, buffer overflow and format string vulnerabilities in Debian GNU/Linux that an attacker could use to remotely execute malicious code has been fixed.
-
July 18, 2004
18
Jul'04
Enterprise-class RAID functions, part 2: N-way mirroring, splitting and more
With the convergence of RAID and lower-priced storage technologies, advanced RAID functions can be enjoyed by any small-to-medium sized organization with critical data.
-
July 14, 2004
14
Jul'04
Continuous backup gains traction
For continuous backup technology, 2004 is the year that vendors have moved from promises to actual products. Although the market is still small -- inhabited by startups such as Revivio, Mendocino Software, Alacritus and XOsoft -- the buzz is ...
-
July 09, 2004
09
Jul'04
Old Mutual rolls out web reporting software to meet new regulations
Financial services group Old Mutual has rolled out web-based reporting software across its business worldwide to consolidate data...
-
July 07, 2004
07
Jul'04
Deals abound for high-end storage
Think high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to give buyers the best possible deals.
-
June 21, 2004
21
Jun'04
Users at risk after web host attack
Users have been warned to brace themselves for attacks on sites which provide patch downloads and web hosting services.
-
June 01, 2004
01
Jun'04
Startup steals a win with thin provisioning
The Allant Group chose 3Pardata for its thin provisioning software, while dirty sales tactics kept EMC out of the deal.
-
June 01, 2004
01
Jun'04
From exposition to exploit: One security book's story
A new manual that discloses vulnerabilities may have had a hand in compromises at supercomputing centers this spring.
-
June 01, 2004
01
Jun'04
Ex-helicopter chief says pilot verdict is 'ridiculous'
A former director of helicopter procurement at the Ministry of Defence has described the blaming of the pilots for the crash on...
-
June 01, 2004
01
Jun'04
Report finds computer system likely culprit in Chinook crash
A former air commodore - one of the highest ranks in the RAF - has questioned the airworthiness of the Chinook Mk2 helicopter...
-
June 01, 2004
01
Jun'04
Chinook 10 years on
This week sees the 10th anniversary of the Chinook ZD576's crash, as former top military officers cast doubt on the finding that...
-
May 28, 2004
28
May'04
Ex-RAF chief says no to blame on Chinook
A former RAF air commodore has questioned the integrity of systems and the airworthiness of the type of Chinook helicopter which...
-
May 23, 2004
23
May'04
Hacking for Dummies: Chapter 10 -- Wireless LANs
Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.
-
May 19, 2004
19
May'04
LAN-free, serverless and domino backups, oh my.
In case you've missed anything, here's a roundup of some of the best original technical content that appeared on SearchStorage.com the week of May 10-14. Tips and Ask the Experts Q&A's cover LAN-free, serverless and domino backups.
-
May 19, 2004
19
May'04
IT experts not losing sleep over code theft
Days after Cisco acknowledged someone may have stolen source code from its network, IT experts said they doubt it will amount to anything catastrophic. After all, source code has made it onto the Internet before, and there's no proof it has ever led...
-
May 16, 2004
16
May'04
Consequences of Cisco source code theft unclear
Opinions are divided on the impact of stolen data now circulating on the Internet.
-
May 13, 2004
13
May'04
Hacking For Dummies: Chapter 7 -- Passwords
In his latest book, "Hacking For Dummies," Kevin Beaver takes the reader into the mindset of a hacker in order to help admins fend off vulnerabilities and attacks.
-
May 10, 2004
10
May'04
'Whispering keyboards' could be next attack trend
An IBM researcher's found a way to lift passcodes and other sensitive data by recording the sound of keystrokes.
-
May 02, 2004
02
May'04
Return to sender?
Several researchers have identified a new e-mail attack that can be used to swamp enterprise e-mail servers, as well as some secondary systems.
-
April 27, 2004
27
Apr'04
Backup school: Quiz two, answer six
Here is the answer to Backup school quiz two, question six.
-
April 21, 2004
21
Apr'04
Startup offers fixed-content archive for multiple applications
Former CTO of the New York Times has started Archivas, a company that archives fixed content from different applications in a single, centralized repository for half the price of EMC's Centera.
-
April 20, 2004
20
Apr'04
Cisco SNMP flaw allows for DoS attacks
A coding flaw in Cisco's IOS software for certain routers and switches could leave networks vulnerable to denial-of-service attacks.
-
April 19, 2004
19
Apr'04
UK clearing house joint venture to provide online payment service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...
-
April 15, 2004
15
Apr'04
Bacs launches online billing service
UK clearing house Bacs has embarked on a joint venture with a US software company to provide an online bill presentation and...
-
April 11, 2004
11
Apr'04
IBM and Cisco battle remote attack vulnerabilities
-
March 28, 2004
28
Mar'04
Software Forensics: Chapter 2 -- The Players: Hackers, Crackers, Phreaks, and Other Doodz
Read Chapter 2, Players: Hackers, Crackers, Phreaks, and Other Doodz, from the book "Software Forensics" written by Robert M. Slade.
-
March 17, 2004
17
Mar'04
Best practices for enabling and maintaining compliance
As part of our Storage Decisions conference preview series, Shaun Mahoney, senior storage engineer for Citigroup, Randy Wilson, assistant vice president of IT at Essex Investment Management Company and Enterprise Storage Group's Peter Gerr discussed...
-
March 01, 2004
01
Mar'04
There's no government like no government