Your IP is:

216.73.216.0

[More Detail]


Instant Port Checker

IP:[get my ip] Port1:[EL2/PR2/PM3]   [XON NVR] Port2: Port3:

Skip to content

Virtual SANs: Scale Out’s Next Iteration

Shared, block storage SANs have been the exclusive domain of big, centralized storage arrays, but distributed systems are about to crash the party.
Network Computing

Categories: General.

Tags: , , , , ,

Evernote Breach: What It Means To Enterprise IT


By now, you have heard about the latest in SaaS security woes: Evernote. As a user of the service, I was notified of the breach on Saturday. Evernote’s systems were compromised to the extent that individuals were able to access user information, which included encrypted passwords. Unlike the LinkedIn breach, where the passwords were encrypted, but not “salted” (which provides protection against brute force dictionary attacks,) Evernote’s passwords were both encrypted and salted. Evernote, correctly in my view, decided to implement a system-wide password reset, even though there was no evidence of a breach of customer content or credit card information. But this episode does have me thinking about a couple of things.

Categories: General.

Tags: , , ,

4 Big BYOD Trends For 2013


Last year, research firm Gartner heralded the bring-your-own-device, or BYOD, phenomenon as the “most radical shift in enterprise client computing since the introduction of the PC.” Such headlines often smack of hyperbole but so far, BYOD has lived up to expectations.

Categories: General.

Tags: , ,

Next Generation Firewalls 101

Next generation firewalls combine application awareness and deep packet inspection to give companies more control over applications while also detecting and blocking malicious threats.
Network Computing

Categories: General.

Tags: , ,

HP Launches Big Data Security Products, Threat Research


HP this week released new big data tools designed to provide businesses with better information security intelligence gathering capabilities, and launched a new information security research group that’s been tasked with providing better threat intelligence for HP’s own security products.

Categories: General.

Tags: , , , , ,

Stuxnet, The Prequel: Earlier Version Of Cyberweapon Discovered


SAN FRANCISCO — RSA CONFERENCE 2013 – Researchers at Symantec have identified an earlier version of the Stuxnet malware that shows that the cyberattacks on Iran’s Natanz nuclear plant date back as early as 2005 and targeted another piece of uranium-enrichment equipment.

Categories: General.

Tags: , , , , ,

11ac’s First Wave: What to Expect

802.11ac will super-charge Wi-Fi, but pre-standard products will come with limitations. Here’s what you can expect as 11ac products debut in 2013.
Network Computing

Categories: General.

Tags: , , ,

WLAN Stress Tests: What’s the Use?

Wireless hardware testing can shed much-needed light on Wi-Fi products when every vendor claims to have the best stuff. But you have to pay attention to the testing details.
Network Computing

Categories: General.

Tags: , , ,

Will SDN Kill TRILL?

Layer 2 multipathing standards such as TRILL and SPB may seem redundant in an SDN world. But these standards still have a role to play while we wait to see how the SDN market matures.
Network Computing

Categories: General.

Tags: ,

New security tool serves Amazon Cloud users

For many IT managers, moving your company’s backbone to the cloud brings a certain sense of freedom. However, the task of caring for and protecting your assets remains. After all, the operative word in “virtual server” is “server”; virtual or not, it’s still a fully functioning server from an operational sense, carrying the same risks and vulnerabilities inherent in physical servers. You’ll need vulnerability management tools to ensure those servers are secure.

Categories: General.

Tags: , , , , ,