Friday, April 10, 2009

Microsoft eating up netbook market; Conficker awakens, starts scamming; Protocol fuzzing

China denies cyberattacks on U.S. power grid; Silicon Valley Cable-Cutters: The Real Harm; Inside the Smithsonian Institution's first "virtual museum"
Network World logo

Daily News PM Alert

NetworkWorld.com | LANs & WANs Research Center | Update Your Profile


Sponsored by Avaya
rule

Mastering UC: A Law Firm's Example
In this live webcast, the CIO of one of the largest, U.S.-based intellectual property law firms talks about his experiences implementing a unified communications solution. He'll describe the challenges and resulting benefits, and how his firm has mastered UC.

rule

Spotlight Story
Microsoft eating up U.S. and global netbook markets

John Fontana By John Fontana
Microsoft's chest thumping last week over its 96% share of the U.S. netbook market for February doesn't appear to be just its normal bravado as the company also is charging toward dominance on a global front. Read full story

Related News:

News podcast: Network World 360
Cuts in fiber-optic lines early Thursday at two locations near Silicon Valley shut down two IBM facilities and affected an organization in charge of Internet domain names. Malware attacks from China and Russia designed to shut down the U.S. electrical grid in a time of war did not occur, China said Thursday. (3:06)

Follow Network World on Twitter

Conficker Awakens, Starts Scamming
The Conficker worm is back in action and stumping security experts once again. One of the most craftily designed pieces of malware recently got an update and is finally starting to behave like other worms. Here's what's going on.

Protocol fuzzingPurser: Fuzzing is the art of feeding a bunch of random stuff (You know, kinda like the same thing many analysts do to us only more credible/useful) to a program or protocol to crash it and analyze the results. This is why many vendors want your crash data. It is ULTRA important! A crash tells a code jockey so much about a program. It can also tell a hacker even more.

Bluetooth 3.0 Coming April 21?
The Bluetooth 3.0 buzz is building. According to several industry blogs, the short-range wireless standard Bluetooth 3.0 will get its official launch on April 21. However, the developers of the standard, the Bluetooth Special Interest Group, aren't officially saying anything. According to blog DVice, it has received a press release from the Bluetooth SIG that the latest Bluetooth standard will debut April 21 when specifications will be unveiled.

China denies cyberattacks on U.S. power grid
Malware attacks from China and Russia designed to shut down the U.S. electrical grid in a time of war did not occur, China said Thursday.

Silicon Valley Cable-Cutters: The Real Harm
How many people did the cable cutters kill? This is not an attempt to be overdramatic, but when you cut the fiber optic that provides dial tone and Internet to large numbers of people in four counties, as well as their 911 centers, you put lives at risk. If the outage continues long enough, at some point this risk becomes sad reality.

Where did Sun go wrong?
Just before the dot-com boom that spawned the meteoric rise of Sun Microsystems came careening to a halt, then-CEO Scott McNealy and President Ed Zander held a meeting where they discussed the future of their company.

Inside the Smithsonian Institution’s first “virtual museum”
While many education organizations would love to have their own museums, it can be costly to own a building large enough to display their exhibits. The Smithsonian Latino Center has solved this problem by taking its museum online.


Eye-catching gadgets at CTIA
10 eye-catching gadgets at CTIA From WiMAX hotspots to $2,000 cell phones, a look at what caught our attention at CTIA Wireless.

Are you an IT geezer?
Quiz: Are you an IT geezer? (and we mean that in a good way)Sure, the new generation knows Facebook, Android and Twitter. But what about ISDN, SNA and X.25? Take the quiz!

Sponsored by Avaya
rule

Mastering UC: A Law Firm's Example
In this live webcast, the CIO of one of the largest, U.S.-based intellectual property law firms talks about his experiences implementing a unified communications solution. He'll describe the challenges and resulting benefits, and how his firm has mastered UC.

rule

Network World's IT Resource Library
Whether you're looking to gear up on one specific topic or you're trying to stay current on several areas, Network World's resource library has what you're looking for. Our comprehensive collection of resources will make your job easier.
Visit Now


Complimentary DNS newsletter
Sign-up today and receive the latest DNS news and analysis. This newsletter provides deep insight into this murky area and offers ways to understand and mitigate risk with better management and control of your domain, email and DNS.
Sign up now

 

04/10/09

Today's most-read stories:

  1. Fearing and loathing in Windows 7
  2. Conficker, the Internet's No.1 threat, gets an update
  3. Are you an IT geezer? (and we mean that in a good way)
  4. Microsoft eating up U.S. and global netbook markets
  5. Feds join Twitter revolution
  6. How serious is threat to power grid?
  7. Report: Nokia Siemens bids for much of Nortel
  8. 10 eye-catching gadgets at CTIA
  9. EMC, VMware promise major virtualization, storage upgrades
  10. Cisco to buy Tidal Software for $105 million
  11. Students learn through robot battles


Network World on Twitter: Get our tweets and stay plugged in to networking news


DNS news and tips
DNS is not secure and is extremely vulnerable. DNS is at the core of every connection we make on the Internet. While some servers are indeed vulnerable, because of inadequate management or knowledge, the real threat is from the protocol itself and how data is easily subverted or faked as it moves around the internet.
Receive the latest DNS news and tips



IT Buyers guide

 


This email was sent to networking.world@gmail.com

Complimentary Subscriptions Available
for newsletter subscribers. Receive 50 issues
of Network World Magazines, in print or
electronic format, free of charge, Apply here.

Terms of Service/Privacy

 

Subscription Services Update your profile
To subscribe or unsubscribe to any Network
World newsletter, change your e-mail
address or contact us, click here.

Unsubscribe

Network World, Inc., 492 Old Connecticut Path, Framingham, MA 01701
Copyright Network World, Inc., 2009

www.networkworld.com

 

 



No comments: