Latest News
In Pictures: State of Data & AI report launch breakfast
CBA using facial recognition logins to verify disputed payments
Australia takes another step toward a central bank digital currency
UK police arrest four over cyberattacks on M&S, Co-op and Harrods
Viva Energy completes greenfield HR setup in time for Coles cutover
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
protocol
protocol
CAs decide Linux fate in Windows 8
Secure boot may prevent Linux dual booting with Windows 8.
Darren Pauli
Sep 22 2011 4:28PM
Security
Whole of APAC put on IPv4 rations
Only addresses for IPv6 bridging left.
Liam Tung
Apr 15 2011 7:38AM
Networking
Analysis: Bittorrent Inc open sources protocol
Adopts P2P approach to development.
Lawrence Latif
May 26 2010 6:53AM
Software
Euro Commission clears Cisco's Tandberg buy
Must divest interoperability protocol.
David Neal
Mar 31 2010 6:48AM
Hardware
Salmat coder blamed for St.George data leak
42,000 account details compromised.
Liz Tay
Mar 4 2010 1:40PM
Strategy
Day Eleven: iiNet chief has "never used" a BitTorrent client
Understood the protocol better.
Ry Crozier
Nov 3 2009 9:15AM
Telco/ISP
Concerns raised over the ability to use HTTPS on a malicious site
Users could mistake malicious sites for safe sites.
Dan Raywood
Oct 14 2009 11:26AM
Security
Rogue DHCP malware strikes again, now harder to detect
A new variant of the DNS-changing Trojan.Flush.M malware has been spotted, security researchers said this week.
Dan Kaplan
Mar 18 2009 10:15AM
Security
Adobe to open up Flash streaming protocol
Adobe is to open up the messaging protocol used in its Flash platform to deliver multimedia content over the internet, in a move designed to help developers build richer applications.
Daniel Robinson
Jan 22 2009 6:20AM
Software
Patch Tuesday: Microsoft fix the SMB protocol
The latest update from Microsoft for its monthly patch batch involves fixing an unauthenticated remote code execution vulnerability that exists in the way that Microsoft Server Message Block (SMB) Protocol software handles SMB packets.
Chuck Miller
Jan 14 2009 10:41AM
Security
UIPv6 protocol stack released
Cisco, Atmel and the Swedish Institute of Computer Science (SICS) have announced the availability of uIPv6.
Aharon Etengoff
Oct 15 2008 6:56AM
Networking
Microsoft submits scanner protocol to IEEE
Microsoft has contributed its Web services protocol specification for consumer scanning peripherals to the Printer Working Group (PWG) of the IEEE industry standards body..
Clement James
Jun 3 2008 7:20AM
Hardware
Mozilla says URL protocol handling vulnerability is a Firefox issue
Mozilla's chief security guru on Monday issued a mea culpa for her company's handing of a URL protocol handing flaw that was believed to only be exploitable from Internet Explorer (IE).
Frank Washkuch
Jul 25 2007 9:52AM
Security
VoIP user claims Skype protocol hack
Chinese firm finds a way into the network.
Staff Writers
Jul 17 2006 1:15PM
Security
Following protocol
The virtual private network (VPN) is now a widely accepted feature of corporate IT security – and SSL is gaining on the established IPSec standard as the most popular VPN security protocol. How do they stack up?
David Lynch
Sep 29 2004 11:18AM
Security
Spammers using new email authentication protocol
Spammers are using Sender Policy Framework (SPF), a new email authentication protocol, to make their messages appear legitimate, according to a study by email security firm MX Logic.
Marcia Savage
Sep 9 2004 5:07PM
Security
Australian CERT warns of new flaw in wireless protocol
The Australian Computer Emergency Response Team issued an advisory Thursday warning of a flaw in the 802.11 wireless protocol that makes WLANs vulnerable to a denial-of-service attack.
Marcia Savage
May 13 2004 10:14PM
Security
Most popular tech stories
Woolworths Group consolidates 30,000 marketing assets into Adobe platform
NSW gov employers 'should not' use AI for hiring decisions
El Jannah backs Salesforce martech stack to support store expansion
Viva Energy completes greenfield HR setup in time for Coles cutover
Optus' first AI chief Samantha Lawson exits
Ingram Micro hit by ransomware
PHOTOS: The M&A Session - Sydney
The techpartner.news podcast, episode 1: Why OxygenIT dropped 80 percent of its customers
Announcing the 2025 Impact Awards Partner Leadership finalists
Virtual IT Group joins forces with NZ's The Instillery
Blackberry celebrates "giant step forward"
Laing O'Rourke brings IoT to hard hats
Co-founder of IoT telco Thinxtra Loïc Barancourt departs
365mesh launches updated Aussie-made vibration sensor
Telstra to host IoT State of the Nation event on November 14
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?