THE WHATIS.COM WORD-OF-THE-DAY   
December 30, 2003

ethical worm
 
______________________
SPONSORED BY: Smart CRM

Today, it's about smarter CRM. And that's exactly why SearchCRM.com
and Peppers & Rogers Group have joined forces to bring you the
industry's definitive CRM conference that delivers on both the
promise and challenges of enterprise CRM. Attend Smart CRM conference
in Atlanta, GA, February 11 - 13, and go home with tested CRM
solutions and critical tips and techniques from the industry's
leading independent experts, analysts, and the top principals from
the Peppers and Rogers Group. Confirm your registration today and
save $1,495.
http://searchCRM.com/r/0,,19798,00.html?track=NL-34

______________________   
TODAY'S WORD: ethical worm
 
See our complete definition with hyperlinks at
http://searchwin2000.techtarget.com/sDefinition/0,,sid1_gci888454,00.html?track=NL-34

An ethical worm is a program that automates network-based
distribution of security patches for known vulnerabilities. Like its
malicious counterpart, the ethical worm could propagate across
networks exponentially and perform its tasks without user knowledge
or consent, through a process sometimes called a drive-by download.
According to some, such invasive behavior is warranted because many
system administrators fail to install appropriate patches and service
packs, despite knowledge of vulnerabilities and available solutions. 

The deployment of ethical worms for patch distribution is frequently
suggested in discussion forums, especially in the wake of a
wide-ranging malicious attack. In January 2003, a worm called the SQL
Slammer exploited a known buffer overflow vulnerability in Microsoft
SQL 2000 server systems to cause widespread Internet outages. The
attack, which may have been carried out to illustrate the problem of
lax security, was launched precisely six months after Microsoft
released a patch for the flaw. Had the patch been installed to
vulnerable systems, the SQL Slammer attack might have had little
impact. 

Although installing security solutions through ethical worms would,
at least, ensure they were deployed, there are concerns that the
method would create more problems than it solved. According to Ed
Skoudis, author of the book, "Counter Hack: A Step-by-Step Guide to
Computer Attacks and Effective Defenses," even if an ethical worm
worked flawlessly, it could inadvertently cause damage because of
conflicts with other programs and particular system configurations. 

__________________________
RELATED TERMS:

patch
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci212753,00.html?track=NL-34

drive-by download
http://whatis.techtarget.com/definition/0,,sid9_gci887624,00.html?track=NL-34

buffer overflow
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci549024,00.html?track=NL-34

______________________
SELECTED LINKS:

SearchSecurity.com offers a tip from Ed Skoudis, "Ethic worms: a bad
idea."
http://searchsecurity.techtarget.com/tip/1,289483,sid14_gci877038,00.html?track=NL-34

SearchNetworking.com offers a page listing white papers about
"Network Security."
http://searchnetworking.techtarget.com/whitepapersByCategory/0,293837,sid7_tax289248_idx0_off10,00.html?track=NL-34

Ed Skoudis's book is available at Amazon.com.
http://www.amazon.com/exec/obidos/tg/detail/-/0130332739/002-8822961-0676017

______________________
TODAY'S TECH NEWS:

FROM SAP TO SOBIG, 2003'S HIGH-TECH WINNERS AND LOSERS
Some will pop the bubbly on New Year's night. Others just can't wait
for the calendar to run out. Check out our list of 2003's winners and
losers.
http://searchsap.techtarget.com/originalContent/0,289142,sid21_gci942124,00.html?track=NL-34

CIO PRIORITIES FOR 2004
>From security to staffing, CIOs have plenty to do in 2004. Read some
CIO wish lists, and find out what Forrester Research has to say about
the top CIO priorities next year. 
http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci942247,00.html?track=NL-34

IF CONTENT IS KING, IBM WANTS THE CROWN
Analysts expect content management to be a pivotal component of Big
Blue's on-demand strategy in 2004.
http://search400.techtarget.com/originalContent/0,289142,sid3_gci942090,00.html?track=NL-34

>> Catch up on all the latest IT news at  
http://searchtechtarget.techtarget.com?track=NL-34

______________________
STRANGE BUT TRUE | Top 10 Bizarre IT News Items for 2003

Technology might make our lives easier, but it's also good for a yuck
or two. Or 10. Actually, the list of the most bizarre tech-related
stories of 2003 could be a longer and more convoluted mess than Mr.
and Mrs. Liza Minelli's divorce papers. But we've culled 10 that
stand out.

http://searchcio.techtarget.com/originalContent/0,289142,sid19_gci942372,00.html?track=NL-34

______________________
SECRET WORD-OF-THE-DAY | What is IT?

Is this a condition you might get from eating too many blueberry
treats? In a wireless context, it's a specification that describes
how various devices can communicate with each other using a
short-range wireless connection. 

Do you think you know the Secret Word? Click this URL and see if
you're right!
http://searchmobilecomputing.techtarget.com/sDefinition/0,,sid40_gci211680,00.html?track=NL-34

______________________________ 
RECENT ADDITIONS AND UPDATES 

[1] Fast Guide to IT Humor 
http://whatis.techtarget.com/definition/0,,sid9_gci942103,00.html?track=NL-34

[2] churn rate 
http://searchcrm.techtarget.com/sDefinition/0,,sid11_gci940457,00.html?track=NL-34

[3] unary 
http://whatis.techtarget.com/definition/0,,sid9_gci940292,00.html?track=NL-34

[4] Ethernet/IP 
http://searchnetworking.techtarget.com/sDefinition/0,,sid7_gci940057,00.html?track=NL-34

[5] Faraday cage 
http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci942282,00.html?track=NL-34
 

____________________________________________________________________
:::::::::::::::::::  WHATIS.COM CONTACTS   :::::::::::::::::::

MARGARET ROUSE, Site Editor ([EMAIL PROTECTED])

IVY WIGMORE, Consulting Editor ([EMAIL PROTECTED])

LOWELL THING, Consulting Editor and Founder ([EMAIL PROTECTED])

GABRIELLE DERUSSY, Advertising ([EMAIL PROTECTED])

:::::::::::::::::::::  ABOUT THIS NEWSLETTER  ::::::::::::::::::::::
This newsletter is published by TechTarget, the most targeted IT
media.  http://www.techtarget.com?track=NL-34

Copyright 2003 TechTarget. All rights reserved.
____________________________________________________________________

To unsubscribe from "Word of the Day":

Reply to this e-mail with REMOVE in the Subject line
 - OR -
Go to unsubscribe:
http://WhatIs.com/u?cid=474317&track=NL-34
  
Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.


Reply via email to