Applications

The Napster song-swapping service has undergone a transformation from hotbed for piracy to legitimate peer-to-peer service in a large pack of formidable competitors. Napster 2.0, to be officially launched October 29th by Roxio, will provide legal dollar-per-song access to a catalogue of 500,000 titl...

In an effort to send a clear message through the noise of constant software security warnings, the SysAdmin Audit Network Security (SANS) research group has released its list of the year's top 20 vulnerabilities. The SANS institute -- which divided vulnerabilities into two lists of 10 for Windows an...

Oracle has released an enterprise database for small businesses, promising the same features of its larger database at an entry-level price and position. With its popular database software now available for less than $1,000 in license fees, Oracle said the entry-level database -- designed to offer f...

Touting more than 150 new features -- including improved interoperability with Windows and Linux -- Apple Computer has announced that its updated Mac OS X Panther operating system will be available on October 24th. The Cupertino, California-based company said Mac OS X version 10.3 delivers new featu...

The aliens of the forthcoming video game Half Life 2 have been upstaged by Grinch-like hackers who stole some of the game's code and posted it online, meaning release of the real game likely will be pushed back until after the holiday season. Valve Software, maker of the popular first-person shooter...

Microsoft's recent deal with Phoenix Technologies is aimed at "radical simplification to the PC and digital service industry" through enhancements to the Basic Input Output System (BIOS) -- the software that connects operating systems with hardware. Industry observers agreed that the next generation...

While certain Web sites are taking advantage of a vulnerability in Internet Explorer, Microsoft has yet to release an update that can patch exposed systems. However, in the meantime, there are manual workarounds that users can employ to protect their systems against the Qhost-1 Trojan. "You can help...

Once again, computer attackers are taking advantage of a recent vulnerability -- this time an unpatched flaw in Microsoft's widely used Internet Explorer browser -- to have their way with vulnerable Windows machines through malicious programs known as Trojans. The software security holes that affect...

Despite criticism of its technical and legal tactics, the Recording Industry Association of America is continuing its campaign of lawsuits against individual Internet file traders accused of copyright infringement. Opponents of the strategy, which so far has consisted of nearly 1,500 subpoenas and 2...

Inside Windows Server 2003

Windows is often the whipping boy when it comes to server platforms. But many in the industry now admit that Windows Server 2003 offers some significant breakthroughs over earlier versions of Microsoft's server software -- a change that could help Microsoft compete more effectively against Unix and ...

Microsoft has announced it is releasing a beta version of Windows XP for AMD's new 64-bit processor. That's both good news and bad news for AMD. The good news is that Microsoft is showing significant support for the new processor by making a version of XP for it. The bad news is that Microsoft won't...

Internet search leaders Overture and Google both are testing services that deliver local results as they seek to bolster the already burgeoning market for Web searches. Earlier this month, Overture became the first major search engine to begin testing a service that incorporates the geographic locat...

Beneath all the noise generated by the latest security holes in Microsoft's Windows operating system, experts have warned of two open-source security flaws that could allow intruders to corrupt memory, take control of systems and launch a denial-of-service (DoS) attack. Software affected by the most...

DB2 Holes Offer Root Access

IBM's widely used DB2 database software, which often stores critical data such as credit card information, has flaws that would be "trivial" for attackers to exploit. The holes, uncovered by Core Security, a network security firm, involve simple stack-based buffer overflows and are triggered by send...

Following the same pattern of predictions as the one that led to last month's devastating Blaster worm, security analysts have begun to focus on the new crop of Microsoft Windows vulnerabilities and the attack tools created to take advantage of them -- all of which could indicate that a potential ne...

Technewsworld Channels