Thursday 14 April 2011

U.S. takes out Coreflood botnet

Hackers gain root access to Wordpress servers | Toshiba releases self-wiping drives

Network World Daily News AM

Forward this to a Friend >>>


U.S. takes out Coreflood botnet
The U.S. Department of Justice and FBI filed a civil complaint, executed criminal warrants, and obtained a temporary restraining order as part of what they called the most comprehensive enforcement action ever taken by U.S. authorities to disable an international botnet. Read More


WHITE PAPER: Belden

Going Green With Physical Layer Components
IT companies are keeping a keen eye on data center energy efficiency, space savings & the movement to build sustainable LEED-certified, "green" facilities. However, "green" can be difficult to measure at the physical layer. This white paper discusses how physical layer components with innovative, "green" features can lower costs while increasing productivity & health.

WHITE PAPER: Quest Software

Quest vWorkspace Integration and Scalability
This study, conducted at Microsoft's Enterprise Engineering Center by Quest Software, presents actual testing results and discusses the scalability of a virtual desktop infrastructure under extreme conditions - and how end-to-end solutions perform under high-load situations. Read now!

Hackers gain root access to Wordpress servers
Hackers have compromised several servers that support WordPress and may have obtained source code, according to the founding developer of Automattic, the company behind the popular blogging platform. Read More

Toshiba releases self-wiping drives
In an effort to keep sensitive data from prying eyes, Toshiba today announced a new family of hard disk drives for a number of devices, including PCs and printers, that automatically wipe themselves of data when connected to unauthorized hosts. Read More

Libyan rebels set up own mobile network
Rebels in Libya set up their own mobile network, after being disconnected from Tripoli. Read More

Six public relations lessons for open source projects
The Linux Foundation's Collaboration Summit tends to focus on technical and legal sessions for industry experts — but one of the better sessions at the Summit was Press Training for Community Projects. Led by Jennifer Cloer, the Linux Foundation's director of communications and community, the session drew a great mix of open source contributors and press to trade ideas. Read More


WHITE PAPER: IBM

Read now
IBM recently introduced the Virtual Desktop for Smart Business, an end-to-end desktop management solution that allows access to personal PCs from anywhere, using any device, via the Virtual Enterprise Remote Desktop Environment (VERDE) from Virtual Bridges. Read now

Sprint subscribers get carrier billing on Android Market
Sprint subscribers will now be able to pay for the applications they buy on Android Market via their monthly cellphone bill, Google said in a blog post on Wednesday. Read More

Red Hat cache move sparks standards spat
Red Hat's nomination for a Java EE distributed data cache sparks a standards war. Read More

Did You Hear The One About The Hacker Who Stole The Open Source Code?
Sounds like a dumb (take your pick - blonde, nationality, etc.) joke. The hacker who breaks in to steal the source code to an open source project. Read More

Microsoft shows off IE9's HTML5 chops on Windows Phone 7
We've known for a couple of months that Microsoft will deliver a mobile version of Internet Explorer 9 for its Windows Phone 7 smartphones, and today the company used the MIX11 keynote stage to show a preview of the new browser, including HTML5 audio and video capabilities. Read More


WHITE PAPER: Belden Wire

The Path to IP Convergence
While the convergence of building operating systems offers the potential for significant benefits, it also gives rise to many challenges. This white paper discusses the importance of a properly designed, optimized, and seamlessly integrated supporting network and systems. Read More

Microsoft launches cert program for Exchange mobile access
Microsoft will certify mobile applications using ActiveSync's enterprise management features. Read More

Epsilon breach: When should almost public info be private?
A press feeding frenzy followed the somewhat vague April Fools Day announcement by Epsilon Data Management that someone had hacked into its systems and stolen a bunch of email addresses. Was this an important breach? What should you do if you have amassed a pile of such information? Read More

Security fragmentation needs to end
A new week, a new rash of attacks against security vendors, email marketers and banks. It would be easy to point fingers and laugh at the irony, especially in the case of security vendors, but that would be both petty and shortsighted. Read More

Jive Software buys data-mining vendor for social analytics
Jive Software is buying data-mining startup Proximal Labs in a move that will help it derive deeper insights into social-networking data, the companies announced Wednesday. Terms were not disclosed. Read More



GOODIES FROM THE SUBNETS
Up for grabs from Microsoft Subnet: a 5-day Microsoft Licensing Tricks class teaching negotiation tips; a Polycom system. From Cisco Subnet: 15 copies of Cisco Unity books. Enter here.

SLIDESHOWS

Internet2's Top 10 firsts and other achievements
As Internet 2 celebrates its 15th anniversary, here are 10 major achievements and firsts.

MOST-READ STORIES

  1. Hacker 'handshake' hole found in common firewalls
  2. Why didn't Cisco attempt to sell the Flip unit?
  3. Cisco urged to fold more than Flip
  4. IRS e-filing system turns 25
  5. Berners-Lee: Web access is a 'human right'
  6. Military wants full disk encryption for smartphones
  7. VMware's Cloud Foundry opens PaaS
  8. What would a revamped Cisco look like?
  9. 7 dirty consultant tricks (and how to avoid them)
  10. Can IPS appliances remain useful in a virtual-machine world?

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_daily_news_alert as lisab509.pcnews@blogger.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment