========================================================================
CTO SOURCE                                     
http://www.infoworld.com
========================================================================
Tuesday, August 24, 2004

TOP STORIES
========================================================================
* Intrusion detection systems at work
* Network detectives sniff for snoops
* IDS early bird gets the worm
* Attack of the inhospitable host
* The luck of the virus

ADVERTISEMENT
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --
Access the Oracle Grid Computing Glossary
Like any technology, grid computing has a specialized
lexicon of terms, acronyms, and concepts. This comprehensive
glossary provides a definition of grid-related terms,
sponsored by Oracle. Register to access now!
http://newsletter.infoworld.com/t?ctl=847D4B:2B910B2
-- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- --

Intrusion detection systems at work
========================================================================
Posted August 20, 2004, 3:00 p.m. Pacific Time

Thanks to mission-critical Web applications and increasingly
sophisticated threats, IDSes are vying to become a standard part of the
network security toolkit. How well do they work? We expose leading IDSes
to every threat in the book -- and some threats that aren't.

For the full story:
http://newsletter.infoworld.com/t?ctl=847D48:2B910B2

Network detectives sniff for snoops
========================================================================
Posted August 20, 2004, 3:00 p.m. Pacific Time

Just a few short years ago, an IDS was a luxury. Before the rise of the
Web application and the worm, most networks were adequately defended by
a firewall at the perimeter and a virus scanner at the mail server.
Today, the firewall remains effective against clumsy DoS attacks and
run-of-the-mill exploits, but it's hard-pressed to thwart
application-layer attacks that piggyback on welcome protocols and worms
that wind their way inside the network through any overlooked port or a
mobile user's laptop.

For the full story:
http://newsletter.infoworld.com/t?ctl=847D47:2B910B2

IDS early bird gets the worm
========================================================================
Posted August 20, 2004, 3:00 p.m. Pacific Time

Intrusion detection and prevention systems are typically generalists,
scanning network traffic and alerting you to any kind of threat or
anomaly. Arbor Networks' Peakflow X is a specialist, using anomaly-based
detection techniques specifically to thwart unknown or "zero-day" worms.
If you're running Check Point Software Technologies or Cisco network
gear, you can even automate port blocking to choke off propagating
worms, while allowing legitimate traffic to pass through.

For the full story:
http://newsletter.infoworld.com/t?ctl=847D42:2B910B2

Attack of the inhospitable host
========================================================================
Posted August 20, 2004, 3:00 p.m. Pacific Time

Host-based intrusion detection and prevention products are available
from a smattering of vendors, including big guns such as Cisco, Internet
Security Systems, McAfee, and Symantec, but Sana Security's Primary
Response is the one that stands out, and for several reasons.

For the full story:
http://newsletter.infoworld.com/t?ctl=847D43:2B910B2

The luck of the virus
========================================================================
Posted August 20, 2004, 3:00 p.m. Pacific Time

When is a virus attack lucky? When it strikes right in the middle of a
test of intrusion detection systems. In fact, InfoWorld was lucky many
times over as we conducted the testing for "Network Detectives:
Inspecting the Inspectors". Not only were we slammed by the Sasser worm,
but we ran smack dab into a host of Microsoft IIS attacks and a plague
of Gator spyware. Needless to say, our review team was pleased; there's
nothing quite like real-life attacks on real-world networks to find out
what really works.

For the full story:
http://newsletter.infoworld.com/t?ctl=847D46:2B910B2

========================================================================
Ever wonder how others keep up with web services?
Your peers will tell you, although your competitors
probably won't. This is how more than 63,000 people
keep up with the fast-moving news about web services:
the Web Services Report newsletter. Scan its quick
summaries of the week's biggest news in web services,
then move on or click through for the full story. It
may not be the only way to keep up with web services,
but it's the easiest. Subscribe at
http://newsletter.infoworld.com/t?ctl=847D44:2B910B2

ADVERTISE
========================================================================
For information on advertising, contact [EMAIL PROTECTED]

UNSUBSCRIBE/MANAGE NEWSLETTERS
========================================================================
To subscribe, unsubscribe or change your e-mail address for any of
InfoWorld's e-mail newsletters, go to:
http://newsletter.infoworld.com/t?ctl=847D45:2B910B2

To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew
or correct a problem with any InfoWorld subscription, go to
http://newsletter.infoworld.com/t?ctl=847D4A:2B910B2

To view InfoWorld's privacy policy, visit:
http://newsletter.infoworld.com/t?ctl=847D49:2B910B2

Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco,
CA 94107



This message was sent to: [EMAIL PROTECTED]


------------------------ Yahoo! Groups Sponsor --------------------~--> 
$9.95 domain names from Yahoo!. Register anything.
http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/BCfwlB/TM
--------------------------------------------------------------------~-> 

 
Yahoo! Groups Links

<*> To visit your group on the web, go to:
    http://groups.yahoo.com/group/kumpulan/

<*> To unsubscribe from this group, send an email to:
    [EMAIL PROTECTED]

<*> Your use of Yahoo! Groups is subject to:
    http://docs.yahoo.com/info/terms/
 

Reply via email to