Latest News
How small audio upgrades can enhance your hybrid work and improve business ROI
TfNSW's network services deal with Datacom hits $190m
Qantas is building a group-wide AI capability
Swinburne Uni folds DocuSign into processes across organisation
Google tightens Android developer verification
LOG IN
SUBSCRIBE
NEWS
GOVERNMENT
SECURITY
AI
DIGITAL NATION
RESOURCES
PODCAST
EVENTS
ADVERTISE
Search
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
NEWS
BUSINESS
CLOUD
DATA CENTRE
EDUCATION
FINANCIAL SERVICES
HARDWARE
HEALTHCARE
INDUSTRIAL
NETWORKING
PROJECTS
SOFTWARE
STORAGE
STRATEGY
TECHNOLOGY
TELCO/ISP
GOVERNMENT
SECURITY
AI
DIGITAL NATION
HR
MARKETING
FINANCE
LEADERSHIP
GOVERNANCE
EMERGING TECH
RESOURCES
STATE OF SECURITY 2025
State of HR Tech
State of AI 2024
Special Reports
Focal Points
MEDIA HUB
PARTNER CONTENT
PARTNER HUBS
RESEARCH
PODCAST
EVENTS
Data&AI Breakfast
SECURITY AWARDS
DIGITAL NATION AWARDS
BENCHMARK AWARDS
Digital As Usual
ADVERTISE
Log In
Email:
Password:
Remember me
|
Forgot password?
Don't have an account? Register now!
Home
protocol
protocol
CAs decide Linux fate in Windows 8
Secure boot may prevent Linux dual booting with Windows 8.
Darren Pauli
Sep 22 2011 4:28PM
Security
Whole of APAC put on IPv4 rations
Only addresses for IPv6 bridging left.
Liam Tung
Apr 15 2011 7:38AM
Networking
Analysis: Bittorrent Inc open sources protocol
Adopts P2P approach to development.
Lawrence Latif
May 26 2010 6:53AM
Software
Euro Commission clears Cisco's Tandberg buy
Must divest interoperability protocol.
David Neal
Mar 31 2010 6:48AM
Hardware
Salmat coder blamed for St.George data leak
42,000 account details compromised.
Liz Tay
Mar 4 2010 1:40PM
Strategy
Day Eleven: iiNet chief has "never used" a BitTorrent client
Understood the protocol better.
Ry Crozier
Nov 3 2009 9:15AM
Telco/ISP
Concerns raised over the ability to use HTTPS on a malicious site
Users could mistake malicious sites for safe sites.
Dan Raywood
Oct 14 2009 11:26AM
Security
Rogue DHCP malware strikes again, now harder to detect
A new variant of the DNS-changing Trojan.Flush.M malware has been spotted, security researchers said this week.
Dan Kaplan
Mar 18 2009 10:15AM
Security
Adobe to open up Flash streaming protocol
Adobe is to open up the messaging protocol used in its Flash platform to deliver multimedia content over the internet, in a move designed to help developers build richer applications.
Daniel Robinson
Jan 22 2009 6:20AM
Software
Patch Tuesday: Microsoft fix the SMB protocol
The latest update from Microsoft for its monthly patch batch involves fixing an unauthenticated remote code execution vulnerability that exists in the way that Microsoft Server Message Block (SMB) Protocol software handles SMB packets.
Chuck Miller
Jan 14 2009 10:41AM
Security
UIPv6 protocol stack released
Cisco, Atmel and the Swedish Institute of Computer Science (SICS) have announced the availability of uIPv6.
Aharon Etengoff
Oct 15 2008 6:56AM
Networking
Microsoft submits scanner protocol to IEEE
Microsoft has contributed its Web services protocol specification for consumer scanning peripherals to the Printer Working Group (PWG) of the IEEE industry standards body..
Clement James
Jun 3 2008 7:20AM
Hardware
Mozilla says URL protocol handling vulnerability is a Firefox issue
Mozilla's chief security guru on Monday issued a mea culpa for her company's handing of a URL protocol handing flaw that was believed to only be exploitable from Internet Explorer (IE).
Frank Washkuch
Jul 25 2007 9:52AM
Security
VoIP user claims Skype protocol hack
Chinese firm finds a way into the network.
Staff Writers
Jul 17 2006 1:15PM
Security
Following protocol
The virtual private network (VPN) is now a widely accepted feature of corporate IT security – and SSL is gaining on the established IPSec standard as the most popular VPN security protocol. How do they stack up?
David Lynch
Sep 29 2004 11:18AM
Security
Spammers using new email authentication protocol
Spammers are using Sender Policy Framework (SPF), a new email authentication protocol, to make their messages appear legitimate, according to a study by email security firm MX Logic.
Marcia Savage
Sep 9 2004 5:07PM
Security
Australian CERT warns of new flaw in wireless protocol
The Australian Computer Emergency Response Team issued an advisory Thursday warning of a flaw in the 802.11 wireless protocol that makes WLANs vulnerable to a denial-of-service attack.
Marcia Savage
May 13 2004 10:14PM
Security
Most popular tech stories
CBA keeps pushing limits of its Workday environment
Chemist Warehouse runs AI on HR shared inbox
Coles eyes AI to keep shelves stocked in next viral recipe trend
Swinburne Uni folds DocuSign into processes across organisation
Serco connects dispersed workforce through ServiceNow-backed platform
HamiltonJet partners with digital services provider Fortude
SentinelOne signs distribution agreement with Sektor
Rapid7’s new SIEM combines exposure management with threat detection
The techpartner.news podcast, episode 3: Why security consultancy founder Kat McCrabb started with the hard stuff
Bluechip Infotech enters final stage of Goodson Imports acquisition
Blackberry celebrates "giant step forward"
Govt launches consumer tech label program for smart devices
Rail operator Aurizon uses IoT to help save $380m
Photos: The 2024 IoT Awards winners
Photos: IoT Impact 2023 brings together data-enabled productivity, sustainability and trust opportunities
Log In
Don't have an account? Register now!
Email:
Password:
Remember me
|
Forgot your password?