The Wayback Machine - https://web.archive.org/web/20080516233818/http://www.internet.com/security/

Events | Webcasts | Jobs | Video | Solutions | eBooks | Partners | Shop

  • In the world of ITSM, security plays a key role and must be properly factored into the design and delivery of services.
New on Internet.com/security
Last modified: May 16, 2008, 08:00 PM EDT.
Feature PhotoCA: Role-Playing Needs Security Test
It's all about the roles when deciding user access to critical data resources.

More Featured »

Spotlight
Sponsored by:
Register for this Whitepaper
The Impact of Messaging and Web Threats
This Osterman Research whitepaper discusses how messaging threats are evolving, both as independent threats and as a delivery mechanism for web-based attacks. Learn how the risks and costs caused by these threats can impact your business and discover the solution delivery models and layers of protection needed to provide a secure defense against spam, spyware, viruses and other forms of malware.

Read this Whitepaper...

Threats & Alerts View Rss Feed
FakeAle-BI Trojan Sets Registry Entry
Troj/FakeAle-BI is a Trojan for the Windows platform.
  • W32/Sohana-AY is a worm for the Windows platform.
  • Mal/Dbot-A is a file with behavioral characteristics typical of backdoor Trojans.
  • Mal/ObfJS-AO is a script obfuscated in a manner typical of malware.
  • Troj/Agent-GZM when run copies itself to the (System) folder as kd???.exe.
  • Troj/Dloadr-BLS Trojan downloads malware when run.

Risk Management View Rss Feed
Centralized Security Reporting for Open Source
oCERT takes shape, but not every big open source vendor is directly involved.
  • AOL's top privacy watchdog talks about how online data collection really works, balancing data and consumer privacy, and the government's role.
  • But will users go along with multiple desktop operating systems?
  • Latest version of Privilege Manager aims to make implementing Vista security easier, transparent to end-users.
  • Software-as-a-Service applications offer big benefits to small businesses, but is it safe to place your company data in someone else's hands? Here's what you need to know.
  • Culture of sharing needs to be reminded about TMI at work.

Security Best Practices View Rss Feed
The Top 75 Open Source Security Apps
Without much fanfare, the open source security area is growing rapidly. Here are top contenders from anti-virus, firewalls, forensics, intrusion detection, and more.
  • While WPA with PSK is more secure than WEP, it is not infallible. Learn how you can use it to its fullest advantage to protect your Wi-Fi network.
  • The two partners team to provide fine-grain security to SAP and other enterprise applications to outsiders.
  • The adage 'the best defense is a good offense' certainly applies to keeping your network safe from digital criminals. Symantec offers five preventative tips you can employ at your company.
  • Playing fast and loose with software keys is the least of it. Properly defining piracy and its legal ramifications is a good start to crafting your organization's software compliance policy.
  • Don't give into zero-day panic. Most profit-driven malware relies on tried and true exploits and it's up organizations to make sure that their security technologies and processes are up to the task.

Today on internet.com/security

Microsoft Patch Tuesday: May 2008
A patch affecting Microsoft's own anti-malware software is among this month's releases.

Which is More Secure, Leopard or Vista?
A security expert revisits an earlier examination he made of the relative security of Mac Tiger and Windows XP.

CDW: Telework Taking Off
A report from the IT products reseller and services provider paints a picture of a business climate that's coming to terms with telecommuting. Security concerns still loom, however.

Is PCI-SSC Securing the Enterprise or Lining Pockets?
Devised as a way to extend security and lend confidence to the payment card services industry, PCI standards are hardly deterring crafty crooks and merchants are paying the price.

Flickr Taking Privacy Just Casually Enough
People will give up a little privacy to enrich their worlds.

No XP Service Pack 3 for You Today
Microsoft ran into compatibility issues with Windows XP customers who also run Microsoft's Dynamics RMS, a software package for running retail stores.

Half-Million IIS Servers Hit in Cyber Attack
Exploit redirects visits of what appear to be a harmless site to one that downloads malware onto their computer.

Begging to be Spammed
As part of a month-long experiment, McAfee challenged 50 volunteers to generate as much spam as they could. To no one's surprise, it's easy going.

March of The Trojans
450 million users report that Trojans Horse attacks are increasing. Should we be afraid?

Four Sure IDS Choices
You have to do intrusion detection right, but it seems like the more you know, the harder it gets. Here are four options for Linux and Unix that make it a little less daunting.

Security Topics
Security Advisors
Advice and opinion from security experts on threats and trends.

Anti-Spam Products
Regular updates on the latest in anti-spam software.

Information Security Trends
Reports on the latests trends affecting the security within corporate computing environments.

Intrusion/Detection Products
Briefings on the latest products for monitoring network intruders.

Security News
eSecurityPlanet reports daily on news affecting security with corporate computing environments.

Glossary
A comprehensive dictionary of computer security terms, kept up to date with frequent updates.

Security Discussion
An interactive community discussion forum for sharing insight into threats and solutions.

Sponsored Resources Click here to view more sponsored resources
IBM
Developer Kit: Web 2.0
Learn how to leverage ideas and better enable collaboration in your organization using Web 2.0 technologies such as blogs, wikis, and social bookmarking, Find out how Lotus software brings social networking to the enterprise in this Lotus Web 2.0 Developer kit that includes podcasts, articles, demos, and Web casts.

Click here to download!


Video: Is Your Data Center Ready for a Real World Disaster?
Watch as HP simulates a gas leak using real explosives to blow up a data center at a high-tech ballistics center. Every system failed-over after the explosion in less than two minutes including data on an HP StorageWorks XP12000 Disk Array, which failed over flawlessly to an HP StorageWorks XP24000 Disk Array. You don't want to miss this.

Click here to watch


Whitepaper: Converging System and Data Protection for Complete Disaster Recovery
An essential part of a backup and recovery solution is granular data protection. Learn about the balanced approach Symantec offers for information availability and security in which data and systems are protected, yet remain accessible wherever, whenever, and to whomever your business needs dictate.

Click here to download



JupiterOnlineMedia

internet.comearthweb.comDevx.commediabistro.comGraphics.com

Search:

Jupitermedia Corporation has two divisions: Jupiterimages and JupiterOnlineMedia

Jupitermedia Corporate Info

Copyright 2008 Jupitermedia Corporation All Rights Reserved.
Legal Notices, Licensing, Reprints, & Permissions, Privacy Policy.

Advertise | Newsletters | Tech Jobs | Shopping | E-mail Offers

Solutions
Whitepapers and eBooks
Microsoft Article: Will Hyper-V Make VMware This Decade's Netscape?
Microsoft Article: 7.0, Microsoft's Lucky Version?
Microsoft Article: Hyper-V--The Killer Feature in Windows Server 2008
Avaya Article: How to Feed Data into the Avaya Event Processor
Microsoft Article: Install What You Need with Windows Server 2008
HP eBook: Putting the Green into IT
Whitepaper: HP Integrated Citrix XenServer for HP ProLiant Servers
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter, Part 1
Intel Go Parallel Portal: Interview with C++ Guru Herb Sutter, Part 2--The Future of Concurrency
Avaya Article: Setting Up a SIP A/S Development Environment
IBM Article: How Cool Is Your Data Center?
Microsoft Article: Managing Virtual Machines with Microsoft System Center
HP eBook: Storage Networking , Part 1
Microsoft Article: Solving Data Center Complexity with Microsoft System Center Configuration Manager 2007
MORE WHITEPAPERS, EBOOKS, AND ARTICLES
Webcasts
Intel Video: Are Multi-core Processors Here to Stay?
On-Demand Webcast: Five Virtualization Trends to Watch
HP Video: Page Cost Calculator
Intel Video: APIs for Parallel Programming
HP Webcast: Storage Is Changing Fast - Be Ready or Be Left Behind
Microsoft Silverlight Video: Creating Fading Controls with Expression Design and Expression Blend 2
MORE WEBCASTS, PODCASTS, AND VIDEOS
Downloads and eKits
Sun Download: Solaris 8 Migration Assistant
Sybase Download: SQL Anywhere Developer Edition
Red Gate Download: SQL Backup Pro and free DBA Best Practices eBook
Red Gate Download: SQL Compare Pro 6
Iron Speed Designer Application Generator
MORE DOWNLOADS, EKITS, AND FREE TRIALS
Tutorials and Demos
How-to-Article: Preparing for Hyper-Threading Technology and Dual Core Technology
eTouch PDF: Conquering the Tyranny of E-Mail and Word Processors
IBM Article: Collaborating in the High-Performance Workplace
HP Demo: StorageWorks EVA4400
Intel Featured Algorhythm: Intel Threading Building Blocks--The Pipeline Class
Microsoft How-to Article: Get Going with Silverlight and Windows Live
MORE TUTORIALS, DEMOS AND STEP-BY-STEP GUIDES
Morty Proxy This is a proxified and sanitized view of the page, visit original site.