Latest News
As Microsoft Exchange 2016 and 2019 Sunset, How Can Privacy-Conscious Organisations Future-Proof their Email?
Microsoft to cut about four percent of jobs amid hefty AI bets
Google offers new proposal to stave off EU antitrust fine
Defence commits to five more years of Azure worth $495m
El Jannah backs Salesforce martech stack to support store expansion
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
protocol
protocol
CAs decide Linux fate in Windows 8
Secure boot may prevent Linux dual booting with Windows 8.
Darren Pauli
Sep 22 2011 4:28PM
Security
Whole of APAC put on IPv4 rations
Only addresses for IPv6 bridging left.
Liam Tung
Apr 15 2011 7:38AM
Networking
Analysis: Bittorrent Inc open sources protocol
Adopts P2P approach to development.
Lawrence Latif
May 26 2010 6:53AM
Software
Euro Commission clears Cisco's Tandberg buy
Must divest interoperability protocol.
David Neal
Mar 31 2010 6:48AM
Hardware
Salmat coder blamed for St.George data leak
42,000 account details compromised.
Liz Tay
Mar 4 2010 1:40PM
Strategy
Day Eleven: iiNet chief has "never used" a BitTorrent client
Understood the protocol better.
Ry Crozier
Nov 3 2009 9:15AM
Telco/ISP
Concerns raised over the ability to use HTTPS on a malicious site
Users could mistake malicious sites for safe sites.
Dan Raywood
Oct 14 2009 11:26AM
Security
Rogue DHCP malware strikes again, now harder to detect
A new variant of the DNS-changing Trojan.Flush.M malware has been spotted, security researchers said this week.
Dan Kaplan
Mar 18 2009 10:15AM
Security
Adobe to open up Flash streaming protocol
Adobe is to open up the messaging protocol used in its Flash platform to deliver multimedia content over the internet, in a move designed to help developers build richer applications.
Daniel Robinson
Jan 22 2009 6:20AM
Software
Patch Tuesday: Microsoft fix the SMB protocol
The latest update from Microsoft for its monthly patch batch involves fixing an unauthenticated remote code execution vulnerability that exists in the way that Microsoft Server Message Block (SMB) Protocol software handles SMB packets.
Chuck Miller
Jan 14 2009 10:41AM
Security
UIPv6 protocol stack released
Cisco, Atmel and the Swedish Institute of Computer Science (SICS) have announced the availability of uIPv6.
Aharon Etengoff
Oct 15 2008 6:56AM
Networking
Microsoft submits scanner protocol to IEEE
Microsoft has contributed its Web services protocol specification for consumer scanning peripherals to the Printer Working Group (PWG) of the IEEE industry standards body..
Clement James
Jun 3 2008 7:20AM
Hardware
Mozilla says URL protocol handling vulnerability is a Firefox issue
Mozilla's chief security guru on Monday issued a mea culpa for her company's handing of a URL protocol handing flaw that was believed to only be exploitable from Internet Explorer (IE).
Frank Washkuch
Jul 25 2007 9:52AM
Security
VoIP user claims Skype protocol hack
Chinese firm finds a way into the network.
Staff Writers
Jul 17 2006 1:15PM
Security
Following protocol
The virtual private network (VPN) is now a widely accepted feature of corporate IT security – and SSL is gaining on the established IPSec standard as the most popular VPN security protocol. How do they stack up?
David Lynch
Sep 29 2004 11:18AM
Security
Spammers using new email authentication protocol
Spammers are using Sender Policy Framework (SPF), a new email authentication protocol, to make their messages appear legitimate, according to a study by email security firm MX Logic.
Marcia Savage
Sep 9 2004 5:07PM
Security
Australian CERT warns of new flaw in wireless protocol
The Australian Computer Emergency Response Team issued an advisory Thursday warning of a flaw in the 802.11 wireless protocol that makes WLANs vulnerable to a denial-of-service attack.
Marcia Savage
May 13 2004 10:14PM
Security
Most popular tech stories
Optus' first AI chief Samantha Lawson exits
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
El Jannah backs Salesforce martech stack to support store expansion
NAB brings Pete Steel into new digital, data and AI exec role
Adelaide University stands up its digital stack
Dell’s new platform wants to end HCI vendor lock-in
Announcing the 2025 Impact Awards Partner Leadership finalists
Macquarie Cloud Services to move CareSuper from VMware on AWS to Azure
Qantas says 6 million customer accounts accessed in cyber hack
Victoria Police renews decade-long IT support deal for another three years
Blackberry celebrates "giant step forward"
NSW Government building business case for state-wide digital twin
Telstra to host IoT State of the Nation event on November 14
Laing O'Rourke brings IoT to hard hats
Axis Communications opens experience centre in Sydney tech hub
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?