======================================================================== CTO SOURCE http://www.infoworld.com ======================================================================== Tuesday, August 24, 2004
TOP STORIES ======================================================================== * Intrusion detection systems at work * Network detectives sniff for snoops * IDS early bird gets the worm * Attack of the inhospitable host * The luck of the virus ADVERTISEMENT -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Access the Oracle Grid Computing Glossary Like any technology, grid computing has a specialized lexicon of terms, acronyms, and concepts. This comprehensive glossary provides a definition of grid-related terms, sponsored by Oracle. Register to access now! http://newsletter.infoworld.com/t?ctl=847D4B:2B910B2 -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- -- Intrusion detection systems at work ======================================================================== Posted August 20, 2004, 3:00 p.m. Pacific Time Thanks to mission-critical Web applications and increasingly sophisticated threats, IDSes are vying to become a standard part of the network security toolkit. How well do they work? We expose leading IDSes to every threat in the book -- and some threats that aren't. For the full story: http://newsletter.infoworld.com/t?ctl=847D48:2B910B2 Network detectives sniff for snoops ======================================================================== Posted August 20, 2004, 3:00 p.m. Pacific Time Just a few short years ago, an IDS was a luxury. Before the rise of the Web application and the worm, most networks were adequately defended by a firewall at the perimeter and a virus scanner at the mail server. Today, the firewall remains effective against clumsy DoS attacks and run-of-the-mill exploits, but it's hard-pressed to thwart application-layer attacks that piggyback on welcome protocols and worms that wind their way inside the network through any overlooked port or a mobile user's laptop. For the full story: http://newsletter.infoworld.com/t?ctl=847D47:2B910B2 IDS early bird gets the worm ======================================================================== Posted August 20, 2004, 3:00 p.m. Pacific Time Intrusion detection and prevention systems are typically generalists, scanning network traffic and alerting you to any kind of threat or anomaly. Arbor Networks' Peakflow X is a specialist, using anomaly-based detection techniques specifically to thwart unknown or "zero-day" worms. If you're running Check Point Software Technologies or Cisco network gear, you can even automate port blocking to choke off propagating worms, while allowing legitimate traffic to pass through. For the full story: http://newsletter.infoworld.com/t?ctl=847D42:2B910B2 Attack of the inhospitable host ======================================================================== Posted August 20, 2004, 3:00 p.m. Pacific Time Host-based intrusion detection and prevention products are available from a smattering of vendors, including big guns such as Cisco, Internet Security Systems, McAfee, and Symantec, but Sana Security's Primary Response is the one that stands out, and for several reasons. For the full story: http://newsletter.infoworld.com/t?ctl=847D43:2B910B2 The luck of the virus ======================================================================== Posted August 20, 2004, 3:00 p.m. Pacific Time When is a virus attack lucky? When it strikes right in the middle of a test of intrusion detection systems. In fact, InfoWorld was lucky many times over as we conducted the testing for "Network Detectives: Inspecting the Inspectors". Not only were we slammed by the Sasser worm, but we ran smack dab into a host of Microsoft IIS attacks and a plague of Gator spyware. Needless to say, our review team was pleased; there's nothing quite like real-life attacks on real-world networks to find out what really works. For the full story: http://newsletter.infoworld.com/t?ctl=847D46:2B910B2 ======================================================================== Ever wonder how others keep up with web services? Your peers will tell you, although your competitors probably won't. This is how more than 63,000 people keep up with the fast-moving news about web services: the Web Services Report newsletter. Scan its quick summaries of the week's biggest news in web services, then move on or click through for the full story. It may not be the only way to keep up with web services, but it's the easiest. Subscribe at http://newsletter.infoworld.com/t?ctl=847D44:2B910B2 ADVERTISE ======================================================================== For information on advertising, contact [EMAIL PROTECTED] UNSUBSCRIBE/MANAGE NEWSLETTERS ======================================================================== To subscribe, unsubscribe or change your e-mail address for any of InfoWorld's e-mail newsletters, go to: http://newsletter.infoworld.com/t?ctl=847D45:2B910B2 To subscribe to InfoWorld.com, or InfoWorld Print, or both, or to renew or correct a problem with any InfoWorld subscription, go to http://newsletter.infoworld.com/t?ctl=847D4A:2B910B2 To view InfoWorld's privacy policy, visit: http://newsletter.infoworld.com/t?ctl=847D49:2B910B2 Copyright (C) 2004 InfoWorld Media Group, 501 Second St., San Francisco, CA 94107 This message was sent to: [EMAIL PROTECTED] ------------------------ Yahoo! Groups Sponsor --------------------~--> $9.95 domain names from Yahoo!. Register anything. http://us.click.yahoo.com/J8kdrA/y20IAA/yQLSAA/BCfwlB/TM --------------------------------------------------------------------~-> Yahoo! Groups Links <*> To visit your group on the web, go to: http://groups.yahoo.com/group/kumpulan/ <*> To unsubscribe from this group, send an email to: [EMAIL PROTECTED] <*> Your use of Yahoo! Groups is subject to: http://docs.yahoo.com/info/terms/
