========================================================================
TEST CENTER REPORT                              http://www.infoworld.com
========================================================================
Monday, August 23, 2004


========================================================================
* Network detectives sniff for snoops
* IDS early bird gets the worm
* Attack of the inhospitable host
* Adaptec and nStor extend SATA to SANs

ADVERTISEMENT
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
IP - Can you hear me now?
IP Telephony can deliver powerful benefits by cutting costs,
supporting new applications, and improving customer service.
Tune in to learn more.
http://newsletter.infoworld.com/t?ctl=842E35:2B910B2
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

NETWORK DETECTIVES SNIFF FOR SNOOPS
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Just a few short years ago, an IDS was a luxury. Before the rise of the
Web application and the worm, most networks were adequately defended by
a firewall at the perimeter and a virus scanner at the mail server.
Today, the firewall remains effective against clumsy DoS attacks and
run-of-the-mill exploits, but it's hard-pressed to thwart
application-layer attacks that piggyback on welcome protocols and worms
that wind their way inside the network through any overlooked port or a
mobile user's laptop.

For the full story:
http://newsletter.infoworld.com/t?ctl=842E32:2B910B2


IDS EARLY BIRD GETS THE WORM
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Intrusion detection and prevention systems are typically generalists,
scanning network traffic and alerting you to any kind of threat or
anomaly. Arbor Networks' Peakflow X is a specialist, using anomaly-based
detection techniques specifically to thwart unknown or "zero-day" worms.
If you're running Check Point Software Technologies or Cisco network
gear, you can even automate port blocking to choke off propagating
worms, while allowing legitimate traffic to pass through.

For the full story:
http://newsletter.infoworld.com/t?ctl=842E2D:2B910B2


ATTACK OF THE INHOSPITABLE HOST
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Host-based intrusion detection and prevention products are available
from a smattering of vendors, including big guns such as Cisco, Internet
Security Systems, McAfee, and Symantec, but Sana Security's Primary
Response is the one that stands out, and for several reasons.

For the full story:
http://newsletter.infoworld.com/t?ctl=842E2E:2B910B2


ADAPTEC AND NSTOR EXTEND SATA TO SANS
========================================================================
Posted August 20, 2004 3:00 PM Pacific Time

Nothing has been more exciting in storage than following the constant
evolution of SATA disk drives, watching their capacity grow and prices
per megabyte shrink, thus easing deployment of SATA drives in the once
forbidden realm of enterprise SANs.

For the full story:
http://newsletter.infoworld.com/t?ctl=842E31:2B910B2


========================================================================
Keep Your Network Running Tight
Don't waste precious time with potential security
failures. Get the latest on how to keep your network
secure with InfoWorld's security guru, Wayne Rash. This
hands-on, technically oriented weekly e-mail newsletter
brings you the latest news, information, and advice to
keep your network running tight. To subscribe to
SECURITY ADVISOR, go to
http://newsletter.infoworld.com/t?ctl=842E2F:2B910B2

ADVERTISE
========================================================================
For information on advertising, contact [EMAIL PROTECTED]

UNSUBSCRIBE/MANAGE NEWSLETTERS
========================================================================
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=842E30:2B910B2

To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew
or correct a problem with any InfoWorld subscription, go to
http://newsletter.infoworld.com/t?ctl=842E34:2B910B2

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=842E33:2B910B2

Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco,
CA 94107



This message was sent to: [EMAIL PROTECTED]



------------------------ Yahoo! Groups Sponsor --------------------~--> 
Make a clean sweep of pop-up ads. Yahoo! Companion Toolbar.
Now with Pop-Up Blocker. Get it for free!
http://us.click.yahoo.com/L5YrjA/eSIIAA/yQLSAA/BCfwlB/TM
--------------------------------------------------------------------~-> 

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/kumpulan/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to