door

Telstra exchange fire spread by cooling systems

Telstra exchange fire spread by cooling systems

Investigation also points to open fire doors.
Ry Crozier Mar 27 2013 1:39PM Telco/ISP
Windows update to close door on unlocking phones

Windows update to close door on unlocking phones

ChevronWP7 tool under threat.
Stewart Mitchell Jan 13 2011 1:22PM Software
Ex-employees walking out the door with corporate data

Ex-employees walking out the door with corporate data

More than half of workers who left their jobs last year have admitted that they took confidential corporate information with them, according to research by security giant Symantec.
Phil Muncaster Feb 24 2009 5:32AM Security
Google Docs sneaks charges in through the back door

Google Docs sneaks charges in through the back door

Google is making a sneaky move in getting more pennies in its pot by quietly reducing the amount of users who can set up a free Google Apps account.
Emma Hughes Jan 24 2009 2:34PM Software
Microsoft Cofee brews 'back door' fears

Microsoft Cofee brews 'back door' fears

Industry experts have welcomed assurances from Microsoft that the firm has not provided law enforcement agencies with a 'back door' into its systems..
Robert Jaques May 12 2008 7:30AM Security
Ubuntu comes knocking on Oracle's door

Ubuntu comes knocking on Oracle's door

Canonical has stated that its Ubuntu Server needs increased support from independent software vendors and system builders.
Tom Sanders Sep 14 2007 7:25AM Software
AMD opens door to ATI Linux drivers

AMD opens door to ATI Linux drivers

AMD's ATI division is reversing its open source strategy by offering better open source drivers.
Tom Sanders Sep 10 2007 9:52AM Hardware
Adobe opens the door on Lightroom

Adobe opens the door on Lightroom

New application manages digital photo archives.
Shaun Nichols Jan 31 2007 9:25AM Software
Oracle opens door to enterprise Web 2.0 applications

Oracle opens door to enterprise Web 2.0 applications

Oracle has unveiled its new WebCentre Suite, which the firm claims is the first set of enterprise grade Web 2.0 development tools.
Tom Sanders Oct 25 2006 8:42AM Storage
Intel opens door for application accelerators

Intel opens door for application accelerators

Chipmaker formulates cautious response to AMD's open socket.
Tom Sanders Sep 28 2006 10:22AM Hardware
No sneak door to Vista

No sneak door to Vista

Microsoft has made it clear that back doors for government surveillance will not be a part of Windows Vista, its next generation operating system.
Frank Washkuch Mar 7 2006 9:40PM Security
Are backups your back door?

Are backups your back door?

You might assume tapes have some kind of protection built-in, but you’d be wrong
Joanna Shields Jul 1 2005 2:07PM Security
Slam the door on the bad guys

Slam the door on the bad guys

DDoS attacks represent one of the most serious threats to business continuity. But it is possible to fight back, as John Sterlicchi discovers
John Sterlicchi Apr 13 2005 3:00PM Security
Closing the door to web hackers

Closing the door to web hackers

More organizations are turning to remote access to boost productivity, but this makes them more vulnerable to malicious attacks. Check Point’s Niall Moynihan looks at how to go about protecting your web services
Niall Moynihan Jan 7 2005 11:47AM Security
The open network, or an open door to prosecution?

The open network, or an open door to prosecution?

The last decade has seen organizations of all types and sizes investing huge sums in establishing sophisticated computer networks, aimed at enabling employees to better meet customers’ needs and create a competitive edge.
Glenn Stephens Jul 27 2004 5:51PM Security
Our archaic law leaves an open door for cybercrime

Our archaic law leaves an open door for cybercrime

Think what the world of IT was like in 1990. A few lucky researchers, military personnel, government workers and assorted hangers-on would have been able to enjoy the novelty of fledgling email and internet services. If you were a forward-thinking large corporate, you might well have a mainframe or a minicomputer network storing and processing crucial data and, although dial-up modems could connect systems to each other and enable remote terminal access, viruses and hack-attacks were minor worries. The occasional infected floppy disc might contain some malware that could potentially compromise the contents of your expensive 40mb hard drive, but a relatively up-to-date antivirus programme would probably protect you. Hackers and virus writers were mostly a minority sub-culture of cyber-kids operating from their bedrooms bragging and swapping war stories on underground bulletin boards.
Staff Writers May 19 2004 3:49PM Security
Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

Close the Door on Unwanted Guests: Keys to a Safe and Secure Wireless Network

As the benefits of a wireless local area network (WLAN) become more apparent, an increasing number of businesses are quick to adopt this technology.
Chris O’Ferrell Jan 16 2004 11:12AM Security
Shutting The Stable Door After The Horse Has Bolted?

Shutting The Stable Door After The Horse Has Bolted?

Business continuity is no longer just an issue for IT the department as regulators both in the US and Europe are getting tougher on operational risk.
Peter Hough Jan 9 2004 2:31PM Security
Aust data vendor opens door to US govt

Aust data vendor opens door to US govt

Data communications vendor Westel Wireless has signed a joint marketing agreement with its former US distributor King Communications USA that will enable its digital wireless base station gear to be offered to the US government.
Staff Writers Nov 14 2003 12:00AM Software

Log In

  |  Forgot your password?