Sunday, October 02, 2005

Wireless Strategies: Advanced defenses against wireless hacks


You received this because you subscribed to it through ITworld.com. Unsubscribe information below.
Add ITworld.com@itw.itworld.com to your address book and continue to receive our newsletters.

Wireless strategies for IT professionals

 October 3, 2005 An eNewsletter published by wireless.itworld.comPart of the ITworld.com Site Network


 In today's update

›› Feature: Extreme exploits: Advanced defenses against hardcore hacks

›› In the news:
- Cingular readies BlackBerry software on Nokia
- Destructive power of mobile viruses could rise fast


›› Webcasts and white papers:
- Adoption of Mobile Technologies
- Selective access in wireless network security


›› Go figure: Users want longer battery life

›› ITwhirled: Booths silence cell-phone boors

›› From the network:
- How to Choose the Right Search Engine for Your Business

›› FEATURE

Extreme exploits: Advanced defenses against hardcore hacks
This book offers proven techniques for defending against potentially disastrous network and software vulnerabilities -- now and in the future. The chapter available for download at ITworld.com delves into the hot topic of wireless network security.


›› IN THE NEWS

Cingular readies BlackBerry software on Nokia
RealNetworks to provide video services to Cingular
Destructive power of mobile viruses could rise fast
IT and wireless still separated, but talks ongoing

Get the latest news here...


›› GO FIGURE

75 percent
Portion of surveyed users who cite longer battery life as the feature they'd most like to see in their cell phone or PDA.
Source: SmallBusinessPipeline.com


›› WEBCASTS AND WHITE PAPERS

Adoption of Mobile Technologies - New Webcast
Mobile and wireless technologies must be considered an extension of an enterprise's IT infrastructure. To learn more about the latest mobile and wireless technology offerings, watch this Webcast now.

Selective access in wireless network security
Complexity is a major enemy of security. Learn about highly integrated products from leading manufacturers that include all of the elements of security in one place. Watch this new Webcast now.

View more webcasts...      Read additional white papers...

Advertisement



›› ITWHIRLED

Booths silence cell-phone boors
Here's an idea... The next time you are out and about and have the urge to, say, make a phone call to your doctor about some sensitive personal issue, rather than blurt it out for all to hear, step into one of these specially designed privacy boxes. Nothing short of revolutionary.

More offbeat news, reviews and other stuff...


FROM THE NETWORK:

How to Choose the Right Search Engine for Your Business
If you're serious about implementing effective site and intranet search, you need to read Verity's new white paper and learn what pitfalls to avoid that plague even the most seasoned technology buyers.

Enterprise Communications: Dawn of a New Era
Second generation communication technology is now being developed to include VoIP telephony, unified messaging, unified communications and speech recognition based technologies. Learn more in this new webcast now.

Webcast Addresses Key Business Intelligence Technologies
Join leading industry analyst, Peter Burris, as he takes you through the circumstances faced by many businesses as they utilize business intelligence to take better business actions in today?s competitive arena. Go now.



Wanted: Your two cents

Got a Best Practice?
Share it here.

Got an idea for the newsletter?
Send it our way.

Advertisement



Sponsored Links

Buy, Sell or Rent Used Cisco Equip-Save up to 85%
Digital Warehouse buys, sells, & rents used Cisco networking hardware such as routers & switches, as well as Juniper, Extreme & Foundry at 50-80% off list price. One year warrantee and fast delivery.
Broadband Mobile Satellite Modem
Mobile data transfer at up to 3 times speed of GPRS, coverage in 99 countries, packet data service so you are charged for data transferred not time spent online.
Detect and Protect Your PDAs and Smartphones
This white paper will guide you step-by-step through the best practices for securing PDAs and smartphones, along with the benefits of implementing a CREDANT Technologies solution for detecting and protecting these popular productivity tools.
Priority Electronics - Notebook Online Store
Online seller of laptop batteries, accessories, and parts, featuring low prices for all major brands, such as, Dell, Sony, IBM, Toshiba, Compaq, HP, Gateway and more.
FirstSpot - Wi-Fi Hotspot wireless gateway
Wi-Fi Hotspot Management Software for Windows - various enhancements include Data Transfer tracking and Quota System, Hour-pass/day-pass, RADIUS Authentication Mode, Client Isolation and more ...
» Buy a link now

www.itworld.com   open.itworld.com   security.itworld.com   smallbusiness.itworld.com  storage.itworld.com   utilitycomputing.itworld.com   wireless.itworld.com

CUSTOMER SERVICE:   Manage subscriptions    |   Newsletter FAQs
CONTACTS Advertising: Clare O'Brien, VP of Sales Other Inquiries: Jodie Naze, Director, ITworld.com Site Network

Brought to you by:
Accela Communications, Inc. - 118 Turnpike Road - Southborough, MA 01772 USA
Privacy Policy   Copyright © 2005 All rights reserved.



Click here to forward this message to a friend!


Click here to change or remove your subscription.



No comments: