Friday, December 16, 2011

8 Free Wi-Fi security tools

3 tips for avoiding tablet management headaches | The security threat Stephen King warned us about?

Network World Compliance

Forward this to a Friend >>>


8 Free Wi-Fi security tools
Read More


WHITE PAPER: SonicWALL

Next-Gen Firewall Market Analysis: The SonicWALL Difference
The Next-Generation Firewall (NGFW) is rapidly becoming an essential element of the modern organization's information security strategy. Not only does it restore control over network activity and provide protection against dynamic threats, it also does so while reducing the cost and complexity of network security infrastructure. Learn more.

WHITE PAPER: Akamai Technologies, Inc.

Protecting Your Online Channels and Web Applications
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity. Learn more

3 tips for avoiding tablet management headaches
Tablets are a tricky proposition for many IT departments since they have many of the content creation capabilities of laptops but lack mature security software. Read More

The security threat Stephen King warned us about?
Remember the film "Maximum Overdrive," where machines took over and went on a murderous rampage? With cars and appliances ever more computerized, such a security threat seems a little less farfetched as we head into 2012. Read More

Do we need data-loss prevention for printers and copiers?
By now, the idea of using data-loss prevention (DLP) technologies to detect and block unauthorized transit of sensitive information across a network at host and gateway points is well accepted. As applied to peripherals such as printers and copiers, the idea is quite novel. But Canon, a longtime maker of printer-fax-copying machines, says DLP can and should be applied to this, too. Read More


WHITE PAPER: NetIQ

Streamlining IT Operations with Business Service Management
This IDC Technology Spotlight examines the benefits of a business service management practice and tools in response to IT environments becoming more dynamic and complex due to the increased use of virtualization, cloud, SOA, and n-tier application architectures. Learn More

Private investment firm buys Blue Coat for $1.3B
Blue Coat Systems has agreed to be bought by a private equity firm for about $1.3 billion, which will buy out shareholders for a 48% premium over what the company's stock sold for yesterday. Read More

Carrier IQ: A privacy tempest in your pants pocket
Privacy and cyber law experts weigh in on the privacy implications surrounding the Carrier IQ mobile diagnostic software. Read More

iBahn, supplier of hotel internet services, denies breach
iBahn, a provider of internet services to some 3,000 hotels worldwide, denied on Thursday a news report that its network was breached by hackers. Read More


WHITE PAPER: i365

Optimizing Performance for Backup and Recovery
This paper describes the benefits and potential risks of three optimization technologies commonly used for disk-based backup and recovery, enabling you to more confidently optimize your own data protection environment in the following ways.. View Now

Microsoft dissecting Windows Phone messaging bug
Microsoft Windows Phone engineers are reviewing a report that various messaging technologies can be used to send the phone into a reboot and then freeze its messaging center, or hub. Read More

Report: Google, Intel among Chinese hacker targets
Cyberspies from China have hit 760 companies, research institutions, ISPs and government agencies over the past decade, according to a Bloomberg article published Tuesday. Read More

15 top quotes of 2011
As another year draws to a close, we look back on the IT-related comments that stuck with us. Read More

Best and worst celebrity technology moments of 2011
Scarlett Johansson, Justin Bieber, Charlie Sheen, Lady Gaga and Alec Baldwin all make tech news, voluntarily or not Read More



SLIDESHOWS

8 Free Wi-Fi security tools
Here are several free programs you can use to do Wi-Fi stumbling and surveying on all the popular platforms - Windows, Mac OS X, and Linux. You'll be able see all the nearby wireless access points (APs) and their details, including channels, signal levels, and MAC address.

GOODIES FROM MICROSOFT SUBNET
Everyone who enters will win free training from Webucator. Grand prize: a SharePoint training class worth $2,375. All who enter will be awarded a self-paced class of their choosing. Enter here: http://www.networkworld.com/community/contests. Enter here.

MOST-READ STORIES

  1. Why Eric Schmidt's prediction about Android vs. iOS development is wrong
  2. 2012 looking ripe for disgruntled IT pros to switch jobs
  3. Microsoft to start automatic updates of IE without asking the users
  4. Googler's LAN-party house sparks awe and envy
  5. LAN-party house guy spills important cost details
  6. The weirdest, wackiest and coolest sci/tech stories of 2011
  7. Best and worst celebrity technology moments of 2011
  8. Killer resumes for techies
  9. Cisco study finds kids just don't get it
  10. iBahn, supplier of hotel Internet services, denies breach

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_compliance_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments: