Monday, April 13, 2009

The Internet Kill Switch; Twitter virus strikes; Making a PBX 'botnet' out of Skype or Google Voice?

Network World logo

Daily News AM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by HP
rule

HP Storage Virtualization Guide
Check out Network World's IT Roadmap on Storage virtualization. Learn how to reduce the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path. Find out which technology is best suited for your environment.

rule

Spotlight Story
The Internet Kill Switch

Mark Gibbs By Mark Gibbs
There are some ideas about technology that are simply bad thinking. Sen. Rockefeller's proposal to give the president an Internet Kill Switch is monumentally wrong headed. Read full story

Related News:

Twitter virus strikes
Monash: Twitter was hit Saturday by the StalkDaily virus. Twitter had a virus (or worm) whose main symptom is that your Twitter account sends out certain tweets. The virus could be contracted by visiting affected Twitter profile pages.

Making a PBX 'botnet' out of Skype or Google Voice?
Flaws in popular Internet-based telephony systems could be exploited to create a network of hacked phone accounts, somewhat like the botnets that have been wreaking havoc with PCs for the past few years.

Conficker botnet could flood Web with spam
Windows PCs infected with the Conficker worm have turned into junk mail-spewing robots capable of sending billions of spam messages a day, a security company warned today.
Plus:
Conficker Shows Its Colors, Installs Rogue Anti-virus

9 Notebook Rules for Using Wi-Fi In-Flight
We know (though don't always follow) etiquette for public cell phones use, but public laptop usage has avoided a social scrutiny until now. With in-flight Wi-Fi access now available on American Airlines, Delta Airlines, United Airlines, and Virgin America, the chance of being annoyed by your fellow passenger while trapped at 30,000 feet increases exponentially. After all, nobody wants to hear their seatmate cackle as they watch viral College Humor videos or read lame e-mail jokes.

After a year of bad blood, Microsoft, Yahoo talking again
Nearly a year after Microsoft's fractious takeover bid for Yahoo fell through, the two companies are reportedly talking business again.

IBM prototype system blasts through trading transactions
Not sure Wall Street needs any help burning through our economic stimulus money but IBM this week showed off a supercomputing/financial software package it says runs 21 times faster than any current trading systems.

The VideoLAN project: bringing Media to your network
Microsoft Subnet blogger Ron Barrett is revisiting the VideoLAN project that he reviewed in August. VLC Media Player is a one-stop solution for your organizations media needs.

Video: Computer Control via Clapping
New software that uses onset detection and pattern recognition can tell the difference between different clapping sounds. The software can help create interfaces for controlling computers and running applications.

April giveaways galore
Cisco Subnet
and Microsoft Subnet are giving away training courses from Global Knowledge, valued at $2,995 and $3,495, and have copies of three hot books up for grabs: CCVP CIPT2 Quick Reference by Anthony Sequeira, Microsoft Voice Unified Communications by Joe Schurman and Microsoft Office 2007 On Demand by Steve Johnson. Deadline for entries April 30.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by HP
rule

HP Storage Virtualization Guide
Check out Network World's IT Roadmap on Storage virtualization. Learn how to reduce the complexity of managing, backing up and archiving data. Learn the differences between the three main storage virtualization technologies which are in the data path, out-of band and split path. Find out which technology is best suited for your environment.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips

 

04/13/09

Today's most-read stories:

  1. Fearing and loathing in Windows 7
  2. Conficker, the Internet's No.1 threat, gets an update
  3. Are you an IT geezer? (and we mean that in a good way)
  4. Microsoft eating up U.S. and global netbook markets
  5. Feds join Twitter revolution
  6. How serious is threat to power grid?
  7. Report: Nokia Siemens bids for much of Nortel
  8. 10 eye-catching gadgets at CTIA
  9. EMC, VMware promise major virtualization, storage upgrades
  10. Cisco to buy Tidal Software for $105 million
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


Network Management Solutions in your backyard.

Answers are as close as the IT Roadmap event in your area. You can ask questions, compare quotes, and gain a year's worth of direction in less than a day. Coming to 10 cities in '09 including Boston in May and Atlanta in June.
Qualify to attend free at http://www.nww.com/rpgx.jsp?c=XU1PHBZ4303.

IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: