Features

Outwit the web bandits

Outwit the web bandits

Gunter Ollmann explains the countermeasures you can use to actively respond to, and control, phishing attacks
Gunter Ollmann Aug 5 2004 4:55PM Security
It’s a very painful way to learn an obvious lesson

It’s a very painful way to learn an obvious lesson

Illena Armstrong Aug 5 2004 4:33PM Security
Who do you go to for all your browsing needs?

Who do you go to for all your browsing needs?

Jon Tullett Aug 5 2004 4:18PM Security
The busy life of a forensics expert

The busy life of a forensics expert

As an academic and expert witness and advisor to the government, Peter Sommer is a man trying to juggle his time, as Dan Ilett reports
Dan Ilett Aug 5 2004 4:11PM Security
How to curb those dispersed users

How to curb those dispersed users

What can you do if a careless user brings a worm into your network? Marcia Savage outlines how companies can control their mobile users
Marcia Savage Aug 5 2004 3:29PM Security
Divide and rule is the new way of working

Divide and rule is the new way of working

In a connected world, companies need to supplement the security perimeter with other technologies and techniques. Jonathan Gossels and Dick Mackey suggest that zoning could make a significant difference
Jonathan Gossels Aug 5 2004 2:37PM Security
Why strong walls are not enough

Why strong walls are not enough

The crucial job of guarding your enterprise’s network used to boil down to keeping the bad guys out. But as Marcia Savage explains, with wireless, web and remote access, protecting the perimeter is just the start of it
Marcia Savage Aug 5 2004 2:26PM Security
Why storage has to be for keeps

Why storage has to be for keeps

As the vulnerability of stored data grows, and legislation is passed to protect users, senior managers now face the threat of fines and even jail if data is lost on their watch. Failure is not an option, as Illena Armstrong reports
Illena Armstrong Aug 5 2004 1:07PM Security
Take control of your passwords

Take control of your passwords

The tight security at casinos needs to be extended to how the IT systems are used and accessed. John Sterlicchi reports on a case in point
John Sterlicchi Aug 5 2004 12:42PM Security
Long-distance data

Long-distance data

iSCSI was meant to provide a cheap way to link dispersed storage. Paul Hickingbotham reviews its progress
Paul Hickingbotham Aug 5 2004 12:40PM Security
New rules force a focus on data

New rules force a focus on data

If there is a dispute over an email sent last year, will you be able to locate it? Better make sure it’s stored away safely. Ron Condon reports
Ron Condon Aug 5 2004 12:17PM Security
Friend or foe? Show your ID, please!

Friend or foe? Show your ID, please!

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 3 2004 11:04AM Security
To London and beyond

To London and beyond

The Madrid train bombs have raised fears that it is only a matter of when – rather than if – there will be a serious terrorist incident elsewhere. For my own part, I honestly believe that one will happen within two years – and that it will have a massive impact on how business continuity (BC) and disaster recovery (DR) is viewed in this country.
Neil Stephenson Aug 3 2004 10:51AM Security
Chips with everything - the benefits of chip and PIN

Chips with everything - the benefits of chip and PIN

Chip and PIN is on the minds of IT managers looking for EMV certification, finance directors seeking protection from credit card fraud, and store managers wanting to speed up the transaction process to reduce queuing times.
Staff Writers Aug 3 2004 10:35AM Security
Review: LANDesk Asset Manager

Review: LANDesk Asset Manager

LANDesk Asset Manager – actually an add-in to the comprehensive LANDesk Management Suite 8.1 application – provides a host of valuable functionality.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Altiris Asset Management Suite

Review: Altiris Asset Management Suite

Altiris speaks in terms of "lifecycle management," by which it means managing your IT-related assets throughout their useful term of operation. This is enabled by the provision of a core Notification Server, to which might be added a Server Provisioning Suite, a Client Management Suite , (CMS), and an Asset Management Suite, (AMS). The Altiris brochure also describes a utility named the Wise Package Studio which, as you might expect, provides for software distribution.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Centennial Discovery

Review: Centennial Discovery

Centennial Discovery 4.51 is a comprehensive, but easy to use, auditing tool which might be used with a variety of client operating systems. It requires Microsoft SQL Server 7.0 or later, a run-time version of which is supplied on the installation CD.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: iInventory

Review: iInventory

This product is a straightforward and competent auditing tool whose apparent simplicity and ease of use will appeal to many system administrators.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: Intuit Track-It!

Review: Intuit Track-It!

Intuit Track-It! is a comprehensive suite of integrated modules which provide some interesting and useful functionality. The product is available in three flavours of Single User, Standard (facilitating multiple users) and Enterprise, and is nicely presented throughout with good documentation.

Julian Ashbourn Aug 3 2004 12:00AM Security
Review: PC-Duo Enterprise

Review: PC-Duo Enterprise

PC-Duo Enterprise is a well presented application that effectively steers users through all major functions via well-considered dialogs. This "learn-as-you-go" approach will suit the busy network administrator with limited previous experience.

Julian Ashbourn Aug 3 2004 12:00AM Security

Log In

  |  Forgot your password?