Denial-of-service attacks are on the rise, anti-DDoS vendors report

.
  • Agregar a Technorati
  • Agregar a Del.icio.us
  • Agregar a DiggIt!
  • Agregar a Yahoo!
  • Agregar a Google
  • Agregar a Meneame
  • Agregar a Furl
  • Agregar a Reddit
  • Agregar a Magnolia
  • Agregar a Blinklist
  • Agregar a Blogmarks

Denial-of-service attacks are on the rise, anti-DDoS vendors report


Denial-of-service attacks are on the rise, anti-DDoS vendors report

Posted: 07 Feb 2012 05:34 AM PST


Both the number and volume of distributed denial-of-service attacks are increasing, according to new reports from DDoS mitigation companies Prolexic and Arbor Networks.

New Juniper routers converge the access net

Posted: 07 Feb 2012 06:12 AM PST


Juniper Networks this week has unveiled access routers designed to provide an on-ramp to the service provider network from residential, business and mobile networks.

Microsoft Hyper-V Training

Posted: 07 Feb 2012 08:40 AM PST


It is difficult not to have a great deal of sympathy for either a test candidate facing Microsoft Certification or taking on Microsoft's Hyper-V understanding.

In the case of either type of person there is an astoundingly small amount of good documentation. This may be because virtualization is a relatively new topic, or it may be because it is a complex topic.

While there are no shortages of solutions for virtualization, only the basics remain the same among all the offerings. Hyper-V seems to be particularly daunting for several reasons.

The reality is VMware was first out the gate with virtualization software. It proved so cost-effective Intel changed the design of their CPUs to better accommodate virtualization.

Microsoft 'caught on to' this hot topic and released Hyper-V. In classic Microsoft fashion, version 1 was, let me put it kindly, sub optimal. That is diplomatic speak for saying: it sucked.

That was then, and this is now. Redmond has put in considerable effort in making Hyper-V a more than respectable powerhouse. And, for their next rope trick they're going to make it ambiguous.

Hyper-V is a core component in every version of Windows 8. Given this, one does not have to be a rocket scientist to realize Hyper-V is going to be everywhere.

I'm only aware of trainsignal.com as a solution to providing an in-depth look at Hyper-V training in a video format.

MCT instructor Benjamin Culbertson lead you through almost a full day of instruction covering 13 lessons.

If you have been studying for Microsoft certifications and found the material is mute on "R2″ stuff, you need to look no further.

I'm happy to report the instructor is a very high-energy style that keeps you engaged.

Data breach? Blame your third party's remote access systems

Posted: 07 Feb 2012 02:00 AM PST


An in-depth study of data-breach problems last year where hackers infiltrated 312 businesses to grab gobs of mainly customer payment-card information found the primary way they got in was through third-party vendor remote-access applications or VPN for systems maintenance.

Anonymous claims to have released source code of Symantec's pcAnywhere

Posted: 06 Feb 2012 10:17 PM PST


Hacker group Anonymous claimed late Monday that the source code of Symantec's pcAnywhere had been uploaded on The Pirate Bay site.

Adobe launches sandboxed Flash Player for Firefox, hopes for fewer exploits

Posted: 06 Feb 2012 01:45 AM PST


Adobe has released a beta version of Flash Player for Firefox, which has better protection against vulnerability exploits because of a new sandboxed architecture.

Copyright lawsuit targets owners of non-secure wireless networks

Posted: 06 Feb 2012 12:15 AM PST


A federal lawsuit filed in Massachusetts could test the question of whether individuals who leave their wireless networks unsecured can be held liable if someone uses the network to illegally download copyrighted content.

Armored-truck company entrusts tracking software to Windows Azure cloud

Posted: 05 Feb 2012 10:44 PM PST


U.K.-based cash-transport firm G4S is trusting the security of Microsoft's Windows Azure cloud service to keep safe the application that tracks where the money is as it travels to and from customers and the company's vaults in armored trucks.

Mobile device management: Apple's extra little tricky requirement

Posted: 05 Feb 2012 09:54 PM PST


Anyone wanting to buy mobile-device management (MDM) software to manage Apple iOS devices will find they need a special digital certificate from Apple to activate it, a requirement that doesn't apply to the same MDM software that would be used to manage Google Android devices, for instance.

0 comments:

Post a Comment