- Welcome Guest
- Sign In
As operating system migration has become more of an issue, particularly for Microsoft administrators, the company has responded by releasing a beta version of Virtual Server 2004, which promises to pave a gentle migration path to Windows Server 2003 while working with older Microsoft Windows NT 4.0 ...
The amount of Internet fraud perpetrated using a practice known as "phishing" increased 52 percent from December to January, according to the Anti-Phishing Working Group (APWG). In January, there were 176 new, unique attack types reported to the group, compared with 116 in December, the organization...
Various standards bodies and organizations are contributing to and competing for different Web services formats, but promoters of the new WS-Discovery specification say it will expand the market for Web services more than other specs by seamlessly connecting all kinds of devices -- including desktop...
In what a Recording Industry Association of America spokesperson described as "catching up to the pace we were at before," the RIAA has filed five new suits to ensnare another 531 computer users who allegedly have traded pirated music online. The copyright lawsuit tactic first emerged last year in a...
Music fans who download songs from the Internet and share them with friends via P2P technology are still at risk for a copyright infringement claim -- and massive financial damages -- from the recording industry. A ruling by the United States Court of Appeals for the District of Columbia late last y...
Lucent's Mobility Solutions Group has been working to meet the needs of the world's mobile service providers, including traditional wireless carriers and emerging third-generation (3G) mobile operators. Paul Mankiewich is chief architect and chief technical officer for Lucent's Mobility Solutions Gr...
The idea of the Windows desktop PC in a small, mobile form is nothing new, and judging by the amount of notebook sales to consumers, the mobile form factor is in high demand. But the latest approach to the mini PC -- on display at this week's DEMO 2004 trade show in Seattle -- has the endorsement of...
In case you live on the moon, what happened last week was that a small amount of Microsoft source code was leaked to the Web. Microsoft eventually confirmed the leak, but that hasn't stopped the barrage of commentary from the open-source community, which waxed eloquent on why the exposure of Microso...
The recent disclosure of a security hole revealed through the leak of Microsoft Windows 2000 and NT source code is raising several issues that the software giant will have to face as a result of the breach. Analysts are indicating the leak could have a profound effect not only on the security of Mic...
Computer attackers are among those discussing and dissecting exploit code for a recently disclosed, serious security gap in all newer versions of Microsoft Windows operating systems, following a pattern now familiar to victims of the SQL Slammer, Blaster, Nimda or Code Red viruses. And while past ex...
The first vulnerability stemming from the Windows source code apparently leaked last week by one of Microsoft's developers has been posted on the Internet. "It appears that it could be used to attack ordinary users, but according to the person posting it, it does not affect newer versions of Interne...
If one thing is definite about Internet security and worm attacks, say experts, it is that cyber attacks are on the rise in 2004. Consider the worldwide effect of highly publicized worms like last year's SoBig series and the recent Sinit Trojan and MyDoom outbreaks. Given the potency of some of thes...
The past year has had no shortage of costly and complicating computer viruses and worms -- SoBig, Swen, Klez and Yaha, among others -- but what might be more troubling is the intersection of these attacks with the world of spam, which not only is pouring on in quantity, but also is carrying more des...
"How do I love thee? Let me count the ways." Whether we "love" our operating systems or not, counting how many of us use which platforms has become a favorite indoor sport for IT trend-watchers and marketing gurus alike. Why would it matter, unless you're a vendor's shareholder? First, of course, th...
Most airlines outsource their domestic reservation databases, known as Passenger Name Records (PNRs), to organizations with clever names like Sabre, Amadeus and Worldspan. "With the cost of storage dropping, retention times have been increasing, but they've always been at least three to five years,"...