Search

Results 661-680 of 828 for Jack M. Germain.

E-Mailers Beware: Phishers Never Sleep

Can you recall the five worst phishing scams to grace your e-mail in-box? Can you spot a genuine e-mail from your financial institution or government agency? Don't feel too technologically challenged if your answer is no to either -- or both -- of these questions. Even security experts are hard-pres...

WiFi Hotspot Surfers Beware: Sharks Patrol These Waters

WiFi features are as standard on today's portable computers as built-in modems used to be. Laptop users have become accustomed to the ability to connect to the Internet from practically anywhere to reach e-mail, Web sites and music download portals. Consumers even use wireless routers to connect to ...

PRODUCT REVIEW

New PDF Converter Has Office-Caliber Muscle

Plano, Texas-based Docudesk, which makes software tools to convert proprietary file formats such as Adobe's PDF, recently introduced an enterprise version of its deskUNPDF document conversion line. The launch of deskUNPDF Professional provides users with new feature options and conversion formats to...

Making Sense of IT’s Swirling Trends

Information technology managers are facing a massive rollout of new demands and computing models that could potentially make inroads in enterprise computing in 2008. As the technology continues to evolve and the landscape continues to change, IT managers have to pick and choose carefully in deciding...

Kace Tucks Virtual Systems Management Into VMware Infrastructure

Kace announced Monday what it called the first virtual systems management appliances to run natively within the VMware infrastructure. The Virtual Kbox appliances offer users a software product that runs on the user's existing computer hardware. Earlier versions of the Kbox appliance required the in...

PostPath Offers Up Alternative to MS Exchange

PostPath on Wednesday announced the release of PostPath Email Server 3.1, which offers small and medium-sized businesses an alternative to Microsoft Exchange. Email Server 3.1 is interoperable with the Exchange ecosystem as well as BlackBerry and ActiveSync devices. PostPath's e-mail and collaborati...

Old Hack, New Twist: When Rootkits Grab Hold of MBRs

In order to turn bigger profits from their armies of compromised computers, hackers this year will use a new tactic in targeting master boot records with viruses that plant rootkits on computers' hard drives, security experts warn. These infections activate during the boot sequence before the operat...

Symantec Goes Myth Busting With New IT Risk Management Study

Managers of enterprise networks are becoming more aware of the importance of IT risk management issues even though they still cling to four so-called myths that give a false sense of security, according to Symantec. The security vendor on Wednesday released its IT Risk Management Report Volume II, w...

McAfee Aims to Padlock Confidential Customer Data

McAfee announced Monday a security suite that provides enterprise users with host data loss prevention, device management and endpoint encryption to ensure compliance and limit exposure to fines. McAfee Total Protection for Data, a solution for data loss and data leakage protection, has full visibil...

The Road to Enterprise Web 2.0: Bumpy and Still Under Construction

"Web 2.0" was one of the computing industry's biggest catch phrases of 2007. Much like a software upgrade, Web 2.0 brings to mind images of bug fixes and new features. In reality, however, Web 2.0 is nothing more than a new round of Internet functionality bolted onto a very tired and old World Wide ...

EXCLUSIVE INTERVIEW

HP’s Michael Sutton: Web 2.0 and the New Wild West

Web 2.0 applications are quickly taking over traditional activities on the Internet. Web sites are becoming interactive as they offer multiple function applications. This, in turn, is creating greater security risks for both consumers and network operators. One of the biggest concerns is the need fo...

Will the Vista Migration Path Become the Road Less Traveled?

Growing concerns over migrating to Vista may push companies to adopt alternative operating systems. A study released in late November revealed that 90 percent of the Windows users polled reported concerns about migrating to Microsoft's newest operating system. Forty-four percent of those polled said...

MMO Security: Are Players Getting Played?

The video gaming industry has seen huge growth over the past few years with the emergence of the massive multiplayer online model. These video games, examples of which include "World of Warcraft" and "Everquest II," allow thousands of players to interact simultaneously over the Internet in a persist...

IT Security and the No Good, Very Bad Web App Nightmare

The growing popularity of Web 2.0 applications is creating new worries about network security for IT managers and program users alike. One of the biggest concerns is the lack of attention by some product developers and the users themselves to regularly scan their computer systems for holes. The rece...

Remote PC Repair, Part 2: Comparing the Possibilities

After the initial warranty period has expired on a desktop or laptop computer, consumers, SOHO users and SMBs may find themselves stranded when computer woes strike. Without costly warranty extension plans or an IT department, there is little to do but pay up. An alternative to costly local repair s...

Remote PC Repair, Part 1: The Warranty Alternative

Consumers and small-office and home-office workers often buy their computers from online stores or discount warehouses. They often reject add-on support packages at checkout to keep the purchase price low. If the computer breaks within 60 or 90 days, the manufacturer will handle the repairs, they re...

VPNs and Small Business, Part 2: Solutions and Alternatives

Virtual Private Networks, a staple in enterprise settings, are starting to gather momentum as a way to connect remote users and branch offices securely to the networks of small and medium-sized businesses. Smaller companies are finding VPNs cheaper to operate than more costly dedicated T1 phone line...

Citrix Unwraps New Virtualization Strategy

Citrix Systems, a provider of application delivery products, unveiled on Monday its expanded virtualization technology strategy, which it said will extend its reach from data center to desktop. The company's new virtualization strategy allows it to offer an application delivery infrastructure that l...

VPNs and Small Business, Part 1: The SMB Case

Virtual private networks are common in enterprise settings as a way to connect remote users and branch offices securely to the corporate network. VPNs extend a corporation's reach to support worldwide locations. The same usefulness is gaining the attention of small and medium-sized businesses. Small...

Free Software for the SMB

Memo to small business owners: If you are spending a fortune on software to run your business, you'll be interested to know you may be able to get almost everything you need for free. With more than 25.8 million small businesses currently in the U.S. and 671,000 new companies getting started every y...

Technewsworld Channels