MagPortal.com   Clustify - document clustering
 Home  |  Newsletter  |  My Articles  |  My Account  |  Help 

Location: Categories / Business / Technology Management

Magazine articles on organizing and integrating technology systems.
Old Articles: <Older 8721-8730 Newer>
InternetNews
February 18, 2010
SANS Names Mistakes That Cause Vulnerability If programmers were perfect, there would be no vulnerabilities for the bad guys to exploit. SANS Institute has listed the most common mistakes leading to the most common exploits. mark for My Articles 61 similar articles
InternetNews
February 18, 2010
Microsoft Blames XP Blue Screens on Rootkits Microsoft concludes that flaw that caused XP users' machines to crash owed to rootkit malware on their systems, dismissing speculation that a Microsoft patch caused the problem. mark for My Articles 236 similar articles
InternetNews
February 18, 2010
Kneber Botnet Pierces 2,500 Organizations So-called 'Kneber' botnet collects log-in credentials to online financial systems, social networking sites and e-mail systems to break into accounts and steal corporate and government data at an astonishing pace. mark for My Articles 80 similar articles
InternetNews
February 18, 2010
Metasploit Moving Into Commercial Mainstream What began as a standalone community project for testing exploits and fixing flaws is gaining traction in the commercial community, as more enterprises are rolling out support for Metasploit. mark for My Articles 21 similar articles
InternetNews
February 18, 2010
Mozilla Updates Older Versions of Firefox Open source developer's new Firefox 3.5.8 and 3.0.18 updates deliver five key security fixes, three rated by Mozilla as being critical in severity, and two rated as moderate. mark for My Articles 705 similar articles
InternetNews
February 18, 2010
Study: Users Are 'Always On' But At What Cost? New study by Osterman Research finds that ubiquitous mobile devices and access to e-mail and texting is putting users in awkward - and occasionally dangerous - situations. mark for My Articles 30 similar articles
IndustryWeek
February 17, 2010
Peter Alpern
Telematics Finding a Place in Operations Communications technology playing an increased role in monitoring process systems, says wireless communications exec. mark for My Articles 13 similar articles
IndustryWeek
February 17, 2010
Peter Alpern
NASA Tool Could Cross Over to Manufacturing HyperSizer analysis optimizes design architectures, predicts performance of composite materials. mark for My Articles 99 similar articles
InternetNews
February 17, 2010
Juniper Tightens Up Mobile Network Security Networking vendor Juniper aims to shore up mobile security with new connection technology that battens down both ends of the network, and already has some big-name customers. mark for My Articles 196 similar articles
InternetNews
February 17, 2010
When the Cyber Attack Comes, Will We Be Ready? War-game simulation of a massive cyber attack on U.S. infrastructure highlights emergency provisions administration officials might be forced to take. mark for My Articles 150 similar articles
<Older 8721-8730 Newer>    Return to current articles.