Monthly Archives: February 2004
Experts Disagree on Potential Effects of Stolen Code
Despite predictions of Windows-eating superworms and fears of dozens of new vulnerabilities hitting the Internet every week, security experts say it could be some...
Bagle Variant Gains Momentum
A new version of the Bagle virus is making the rounds of the Internet.Known as Bagle.B, the virus is a mass-mailer like the original...
DHS Program Challenged
Businesses may now have a way to turn over private information about critical infrastructure to the Department of Homeland Security with less concern that...
Congress to Review Tech Agenda
Congress faces a relatively brief session this year, with the autumn election portending a timely adjournment, but several IT issues will demand lawmakers attention....
Zone Labs Integrity Zaps
Zone Labs integrity clientless solution is an ActiveX component that performs a quick scan of remote Web clients for nefarious Trojan horses, adware or...
Blue Coat Appliance Protects Against Web Threats
SAN FRANCISCO—Blue Coat Systems Inc. on Monday expanded its lineup of security appliances with the introduction of the high-end ProxySG 8000.The new box runs...
Bandwidth Needs Drive IBMs Blue Gene/L Supercomputer
IBM is signing up a second customer for its Blue Gene/L supercomputer system, bringing the technology to a Dutch astronomy organization that is building...
Step Right Up, Ladies and Gentlemen, and Have Your Credit Card Ready
SCO would rather you volunteer to buy their license online, so they dont have to risk going after you by mail or using threats,...
Tools Treat Storage as a Utility
Veritas Software Corp., Softek and Sun Microsystems Inc. are each aiming to help customers turn data centers into operational storage utilities through several new...
Xen on Track to Debut as X Omega
By midyear, Microsoft Corp. plans to make its XML programming language—currently code-named Xen and soon to be renamed C Omega—available to researchers and academics.At...