of

Spate of robberies hits central Sydney internet cafes

Spate of robberies hits central Sydney internet cafes

Two internet cafes have been robbed by armed men in the central Sydney suburb of Surry Hills within a week in incidents that police believe may be linked to other recent robberies in nearby Gladesville and Petersham.
Staff Writers Sep 3 2004 12:00AM Telco/ISP
IBM scientists decode the DNA of spam

IBM scientists decode the DNA of spam

IBM scientists have used a mix of DNA analysis techniques and Feng-Shui to combat the growing tide of spam.
René Millman Aug 25 2004 4:04PM Security
Email is a victim of its own success

Email is a victim of its own success

What began as a communication tool for the academic community is now rated as the most critical form of business communication.
Steve Ronksley Aug 17 2004 3:36PM Security
Who is in control of Sarbanes Oxley?

Who is in control of Sarbanes Oxley?

The deadline for compliance with Section 404 of the Sarbanes-Oxley requirements (SOX) will come into force at the close of this fiscal year. Companies disclosing their results must implement an internal control structure to assure the accuracy of financial reports, evaluate the control structure periodically and make sure that controls are tested at least annually by an independent audit firm.
Luke Brown Aug 10 2004 4:52PM Security
The busy life of a forensics expert

The busy life of a forensics expert

As an academic and expert witness and advisor to the government, Peter Sommer is a man trying to juggle his time, as Dan Ilett reports
Dan Ilett Aug 5 2004 4:11PM Security
Divide and rule is the new way of working

Divide and rule is the new way of working

In a connected world, companies need to supplement the security perimeter with other technologies and techniques. Jonathan Gossels and Dick Mackey suggest that zoning could make a significant difference
Jonathan Gossels Aug 5 2004 2:37PM Security
Take control of your passwords

Take control of your passwords

The tight security at casinos needs to be extended to how the IT systems are used and accessed. John Sterlicchi reports on a case in point
John Sterlicchi Aug 5 2004 12:42PM Security
Panasonic debuts Viera line of LCD and plasma TVs

Panasonic debuts Viera line of LCD and plasma TVs

Panasonic is aiming high end with its new range of High Definition plasma and LCD monitors, code-named Viera.
Sarah Stokely Aug 4 2004 12:00AM Hardware
Chips with everything - the benefits of chip and PIN

Chips with everything - the benefits of chip and PIN

Chip and PIN is on the minds of IT managers looking for EMV certification, finance directors seeking protection from credit card fraud, and store managers wanting to speed up the transaction process to reduce queuing times.
Staff Writers Aug 3 2004 10:35AM Security
FTR acquires rest of WebCentral: UPDATE

FTR acquires rest of WebCentral: UPDATE

FTR Holdings has signed an agreement to buy the remaining 50.6 percent of Queensland webhost and ASP WebCentral for $19.6 million.
Staff Writers , Fleur Doidge Jul 26 2004 12:00AM Networking
Avalanche of Acrobat rivals expected as channel grows

Avalanche of Acrobat rivals expected as channel grows

Victoria-based software distributor Avalanche Media has announced plans to boost its Australian reseller channel from 40 to 75 by the end of September.
Fleur Doidge Jul 26 2004 12:00AM Software
Police to collect DNA of the innocent

Police to collect DNA of the innocent

The UK House of Lords has allowed police to keep the DNA records of innocent people on file indefinitely.
Dan Ilett Jul 23 2004 6:57PM Security
Downtime is now a matter of choice

Downtime is now a matter of choice

The current perception of IT management and users alike is that downtime of critical servers and their associated applications is just an unfortunate fact of life.
Neil Robertson Jul 20 2004 4:38PM Security
The business of utilizing an IDS

The business of utilizing an IDS

Andrew Wilson explains why fancy intrusion detection technology is worth little if it is not supported by sound, mindful business decisions
Andrew Wilson Jul 15 2004 11:58AM Security
The four phases of SEM

The four phases of SEM

Jim McGrath explains how to collect, analyze, correlate and respond for complete security event management
Jim McGrath Jul 15 2004 11:38AM Security
UK Ministry of Defence denies iPod ban

UK Ministry of Defence denies iPod ban

The UK's Ministry of Defence has denied that it banned employees from using Apple iPod devices on its premises.
Dan Ilett Jul 14 2004 12:31PM Security
Ministry of Sound swaps AV

Ministry of Sound swaps AV

Dance music maker The Ministry of Sound has swapped its anti-virus product for an automated solution to protect 140 desktops.
Dan Ilett Jul 13 2004 3:42PM Security
Apple resellers starved of iMacs until September

Apple resellers starved of iMacs until September

Smaller Apple resellers may be left with no iMacs to sell for two months in the wake of an Apple admission that its next release of the popular line has been delayed until September.
Fleur Doidge Jul 6 2004 12:00AM Hardware
Telcos one-fifth of corporate IT spend

Telcos one-fifth of corporate IT spend

IT spending by Australia's telecommunications sector grew to $1.949 billion dollars in 2003, accounting for 20 percent of the corporate IT spend locally, latest IDC research has suggested.
Staff Writers Jul 6 2004 12:00AM Telco/ISP
Find that nugget of relevant data

Find that nugget of relevant data

Management tools can help you make sense of your logs to pick out real events from the crowd. By John Sterlicchi
John Sterlicchi Jun 29 2004 12:26PM Security

Log In

  |  Forgot your password?