Wednesday, August 1, 2012

Find out what's flowing over port 80 on your network

  Researcher creates proof-of-concept malware that infects BIOS, network cards | Darlene Storm: Def Con: How to hack all the transport networks of a country
 
  Computerworld Networking

Forward this to a Friend >>>


Darragh Delaney: Finding out what's flowing over port 80 on your network
HTTP was designed as a protocol to transport requests and data between clients and web servers. Using this information, you could then lock down your firewall to only allow TCP port 80 and 443 so that other applications would be blocked. This worked okay for a while until application developers figured out ways of tunnelling their data over port 80. Read More


WEBCAST: Oracle

Addressing Your Top Database Management Challenges
Date: Thursday, August 30, 2012, 1:00 PM EDT Learn how your experience stacks up against your peers and gain insight on strategies to address the most pressing issues as new survey results on managing databases are revealed by Crimson Consulting in this live Webcast. Learn More

WHITE PAPER: EMC

Transform End User Computing
Turn to EMC to bring new simplicity, power, and efficiency to end user computing-any user, any device, anywhere. Click to continue

Researcher creates proof-of-concept malware that infects BIOS, network cards
Security researcher Jonathan Brossard created a proof-of-concept hardware backdoor called Rakshasa that replaces a computer's BIOS (Basic Input Output System) and can compromise the operating system at boot time without leaving traces on the hard drive. Read More

Darlene Storm: Def Con: How to hack all the transport networks of a country
At Def Con, 24-year-old Alberto García Illera gave an amazing presentation called "How to hack all the transport networks of a country." The critical vulernabilities that allowed such an intense hack were mindblowing and like one epic exploit after another. Security FAIL! Read More

Richi Jennings: DEF CON 20 roundup: Critical lessons for all
So that was DEF CON 20. The infamous security convention has wound up, leaving hackers of all hat colors bemused, befuddled, and bewildered. This year saw an official NSA appearance, which posed more questions than it answered. It also brought worrying threats to enterprise VPN and Wi-Fi networks. In IT Blogwatch, bloggers count their Lost Wages. Read More

Oracle buys Xsigo for software-defined networking
Oracle said Monday it has inked a deal to buy software-defined networking vendor Xsigo Systems, in a move that will support Oracle's ongoing foray into cloud computing. Terms of the acquisition, which is expected to close within a few months, were not disclosed. Read More


WEBCAST: IBM

How to Take Business Analytics to the Next Level
Live Date and Time: November 29, 2011 - 12:00 PM EST / 9:00 AM PST By attending this webcast you will learn how you can implement an effective BA strategy that will deliver maximum strategic value to your company. Register Now

Mountain Lion and the ancient AirPort Base Station
Reader Nick Hamilton finds himself stuck between old hardware and a new operating system. He writes: Read More

Hospital networks take key role in health care as IT makes further clincial advances
The health care industry's increased use of electronic medical records (EMRs), wireless medical devices and personal mobile technology has turned hospital networks into important components in patient treatment. Practicing medicine now requires maintaining constant wireless connectivity and possibly managing wired network traffic if doctors and nurses are to fully leverage health IT according to health care professionals. Read More

Hackers reveal critical vulnerabilities in Huawei routers at Defcon
Security researchers disclosed critical vulnerabilities in routers from Chinese networking and telecommunications equipment manufacturer Huawei at the Defcon hackers conference on Sunday. Read More

IT's Olympic challenge: Live streaming employees
IT managers in businesses and governments are taking steps to ensure that the Summer Olympics do not bust networks or budgets. The opportunity for problems is there. Read More

 
 
 

PREMIER 100 -- CALL FOR NOMINATIONS

Seeking the very best IT leaders! Now's your chance to nominate a worthy CIO or other top IT executive for the 2013 Premier 100 IT Leaders awards. Computerworld has launched its annual search for technology professionals who have demonstrated leadership in their organizations through the use of information technology and have the strategic vision to align IT with business goals. Nominations are being collected now through August 29, 2012.

SHARK TANK OF THE DAY

But what could possibly go wrong with our way?

Consultant pilot fish gets a call from a client: Something has gone wrong with the company's email, and it's completely stopped -- and a little research turns up the fact that somehow the IP address is wrong.

CAST YOUR VOTE IN THIS WEEK'S QUICKPOLL

The latest version of Mac OS X, Mountain Lion, is now available. Will you be upgrading to Apple's new operating system?

COMPUTERWORLD'S IT SALARY SURVEY 2012

A majority of IT workers say they're under pressure to increase productivity and take on new tasks. But the vast majority are still happy they picked IT as their career.

NEW COMPUTERWORLD JOB BOARD
Search multiple listings now and get new job alerts as they are posted.


 

Get more IT peer perspective online:
LinkedIn Group | Facebook | Twitter

You are currently subscribed to computerworld_networking as jonsan98@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Computerworld, please send an e-mail to online@computerworld.com.

Copyright (C) 2011 Computerworld, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to online@computerworld.com. **

 

 

 

ads

Ditulis Oleh : Angelisa Vivian Hari: 8:35 AM Kategori:

0 comments:

Post a Comment

 

Blog Archive