Monthly Archives: February 2004

Experts Disagree on Potential Effects of Stolen Code

0
Despite predictions of Windows-eating superworms and fears of dozens of new vulnerabilities hitting the Internet every week, security experts say it could be some...

Bagle Variant Gains Momentum

0
A new version of the Bagle virus is making the rounds of the Internet.Known as Bagle.B, the virus is a mass-mailer like the original...

DHS Program Challenged

0
Businesses may now have a way to turn over private information about critical infrastructure to the Department of Homeland Security with less concern that...

Congress to Review Tech Agenda

0
Congress faces a relatively brief session this year, with the autumn election portending a timely adjournment, but several IT issues will demand lawmakers attention....

Zone Labs Integrity Zaps

0
Zone Labs integrity clientless solution is an ActiveX component that performs a quick scan of remote Web clients for nefarious Trojan horses, adware or...

Blue Coat Appliance Protects Against Web Threats

0
SAN FRANCISCO—Blue Coat Systems Inc. on Monday expanded its lineup of security appliances with the introduction of the high-end ProxySG 8000.The new box runs...

Bandwidth Needs Drive IBMs Blue Gene/L Supercomputer

0
IBM is signing up a second customer for its Blue Gene/L supercomputer system, bringing the technology to a Dutch astronomy organization that is building...

Step Right Up, Ladies and Gentlemen, and Have Your Credit Card Ready

0
SCO would rather you volunteer to buy their license online, so they dont have to risk going after you by mail or using threats,...

Tools Treat Storage as a Utility

0
Veritas Software Corp., Softek and Sun Microsystems Inc. are each aiming to help customers turn data centers into operational storage utilities through several new...

Xen on Track to Debut as X Omega

0
By midyear, Microsoft Corp. plans to make its XML programming language—currently code-named Xen and soon to be renamed C Omega—available to researchers and academics.At...