Leon Erlanger

Inside iSCSI: Low-Cost Storage Networking

Networked Storage Backgrounder With the growth of e-commerce and the Internet, storage has suddenly taken on a whole new importance. Once a boring appendage to the server, data storage has become a strategic asset, tapped 24 hours a day by multiple applications and servers, and mined for valuable personalization information and business intelligence. As companies […]

Real Security for Wireless LANs

Have you stayed away from wireless LANs (WLANs) because of their notorious lack of security? If so, its time to take another look. The Wi-Fi Alliance, which tests and certifies products based on the 802.11 specification, recently approved a new security standard called Wi-Fi Protected Access (WPA), which addresses just about every WLAN vulnerability. The […]

Spam War

Besides being the year of war, terrorism, corporate fraud, and blackouts, 2003 was also the year of spam. As more users found their legitimate e-mail vastly outnumbered by spam, spammers and antispam vendors played a constant Tom-and-Jerry game, frantically coming up with evermore-sophisticated techniques to outfox each other. As recently as a year ago, many […]

The Lookout: Get Patched

Security experts have found a new way to exploit a known buffer overrun flaw in Windows Workstation Service. Microsoft Corp. issued a patch for the vulnerability in November and listed several workarounds. But penetration testers at Core Security Technologies discovered that one of the workarounds still lets malicious packets reach Workstation Service. If you havent […]

Should You Trust TrustE?

Like most users, youre alarmed at the myriad ways that companies exploit the Internet to collect, buy, and sell your personal information. You know you should read all those Web site privacy statements carefully, but really, who has the time? Instead, you give personal information only to reputable companies, and you look for some kind […]

IM and P2P Security

You have all your e-mail and Web-filtering software in place, and you carefully monitor message logs for signs of abuse. But little do you know that for months, a disgruntled employee has been instant messaging company secrets to a friend who works for one of your competitors. And hes been using commonly available utilities to […]

File Sharers, Beware

Peer-to-peer file-sharing networks have come a long way since the dawn (and demise) of Napster, with LimeWire, Kazaa, Morpheus, Grokster, and others offering everything from MP3 files to movies, software, and anything that can be exchanged across a digital network. If youre using or plan to use such networks, you should know that copyright infringement […]

Top Five Myths About Safe Surfing

Recently PC Magazine conducted a survey that asked participants to rate their broadband ISP services. We found out that many users dont completely understand the seriousness of potential threats or how to protect their PCs. The following are responses to the top five security misconceptions we encountered. I dont keep important things on my PC, […]

Full Service: 1U Server Roundup

Dynamic Net, a managed Web-hosting provider in Brooks County, Pennsylvania, faced a density problem. Like many companies, Dynamic Net rents or “collocates space for” its servers at a third-party data center. “As anyone in this business knows, collocation fees are based on rack space and connectivity,” says Dynamic Nets CEO, Peter Abraham. “Regardless of how […]

Full Service Servers

Dynamic Net, a managed Web-hosting provider in Brooks County, Pennsylvania, faced a density problem. Like many companies, Dynamic Net rents or “collocates space for” its servers at a third-party data center. “As anyone in this business knows, collocation fees are based on rack space and connectivity,” says Dynamic Nets CEO, Peter Abraham. “Regardless of how […]