Monday, July 23, 2007

When a cell phone goes in the washer; Another reason not to use WEP

Network World

Voices of Networking




Voices of Networking, 07/23/07

By Jeff Caruso

'Net Buzz: When a cell phone goes through the washer, 07/19/07: Cell phones go through washing machines more often than your might think. Here's a tale of two such phones and how they fared.

Wireless Security: You know you shouldn't still be using WEP - Here's another reason, 07/16/07: I heard about a new WEP cracking technique. Can you explain it?

Bradner: What is the right price for technology? 07/18/07: I will admit to being totally baffled by many of the pricing decisions corporations make these days. Clearly, some of the prices are enabled by constrained markets, but in many cases it is hard to determine just what thought process was followed to ...

Optimize Your WAN: Network World Shows You How

In this Executive Guide learn how optimization can supercharge your WAN.

Click Here

Cool Tools: BlackBerry throws a slick Curve, 07/18/07: The Curve is the "smallest and lightest" full QWERTY-keyboard BlackBerry smart phone available.

Dzubeck: Desperately awaiting the wireless revolution! 07/17/07: The buzz for the past month in the wireless mobile marketplace was focused on the iPhone from Apple. It was only after its first day of product release that the first glaring weakness became evident – the AT&T EDGE network. Even though AT&T beefed up ...

Johnson: Security services: the high cost of skills and staffing, 07/17/07: More enterprises considering managed IT security services from carriers because skilled security workers are in short supply and command high salaries.

Tolly: App Accel and Microsoft’s stack attack, 07/17/07: “Niche killer” has been an oft-encountered modus operandi of Microsoft over the years. Whether it is disk defragmentation, disk compression, firewall or antispyware, Microsoft has eventually decided to play the game and, in the process, change the ...

Network Guardians: How to limit what contractors can do on the network, 07/16/07: We have contractors perform a number of critical services, such as managing our IBM blade servers. These staff have to be on the LAN, and they're long-time contractors, so trust levels run pretty high, but I know they shouldn't be able to go ...

Antonopoulos: Virtual servers: More or less secure? 07/16/07: Virtualization is quickly being adopted in many different industries. As virtual machines move from testing and development roles into production, security becomes ever more important. Virtual servers are no less secure than regular servers, and may ...

Nutter's Help Desk: Blocking spam on a Unix system, 07/16/07: We have a Solaris Sparc machine configured with sendmail. Currently a lot of spam is coming to our server. Can you please suggest me how to control spam.

Gearhead: Identifying any CD, 07/18/07: Last week in Gearhead I discussed how CD identification services such as Gracenote and freedb, in conjunction with applications like WinAmp, figure out which CD you have just loaded. The data from these services allows the application to accurately ...

TODAY'S MOST-READ STORIES:

1. 11 corporate anthems to die for
2. 12 IT skills that employers can't say no to
3. Hogwarts IT director quits
4. iPhones flood WLAN at Duke University
5. Duke's iPhone mystery reportedly resolved
6. Readers speculate on Duke's iPhone problem
7. Unmanned aircraft crush worldwide enemies
8. Google's chief legal officer slapped with SEC fines
9. Brazilian plane crash to push malware
10. Microsoft 'silently' restores root certificates

MOST E-MAILED STORY:
Hogwarts IT director quits


Contact the author:

Jeff Caruso is managing editor of online news for Network World. He oversees daily online news posting and newsletter editing, and writes the NetFlash daily news summary, the High-Speed LANs newsletter and the Voices of Networking newsletter. Contact him at jcaruso@nww.com



BONUS FEATURE

IT PRODUCT RESEARCH AT YOUR FINGERTIPS

Get detailed information on thousands of products, conduct side-by-side comparisons and read product test and review results with Network World’s IT Buyer’s Guides. Find the best solution faster than ever with over 100 distinct categories across the security, storage, management, wireless, infrastructure and convergence markets. Click here for details.


PRINT SUBSCRIPTIONS AVAILABLE
You've got the technology snapshot of your choice delivered to your inbox each day. Extend your knowledge with a print subscription to the Network World newsweekly, Apply here today.

International subscribers, click here.


SUBSCRIPTION SERVICES

To subscribe or unsubscribe to any Network World newsletter, change your e-mail address or contact us, click here.

This message was sent to: networking.world@gmail.com. Please use this address when modifying your subscription.


Advertising information: Write to Associate Publisher Online Susan Cardoza

Network World, Inc., 118 Turnpike Road, Southborough, MA 01772

Copyright Network World, Inc., 2007

No comments:

Post a Comment