HomeIT Management

IT Management

Dutch Researchers Create RFID Malware

Pranksters and criminals can infect RFID chips with computer viruses, worms and malware to cause major disruption at places where the popular tracking technology...

McAfee Bumps Weiss into President Slot

McAfee has turned inside to fill the leadership hole left when its president, Gene Hodges, abruptly quit on Jan. 10.The anti-virus security vendor announced...

Terms of Web Service Endearment

As I noted in a summary blog from last weeks OReilly Emerging Technology Conference in San Diego, the competition there to launch new Web...

WebInspect 5.8

While WebInspect includes new features and improved wizards to boost the usability of the product, it still works in a fairly classic penetration-testing mode...

Rooting Out Web App Holes

Despite all the attention that security holes in various operating systems get, the most likely avenue for successfully compromising a corporate system is a...

Appscan 6.0

AppScan 6.0 is the second official release of the product since Watchfire acquired the technology when it bought Sanctum. The previous release was mainly...

Distributor Tosses Paper for Digital

When the time came for California Distribution to upgrade its copiers, David Friday wanted more than just photocopying capability. His company based its performance...

ERP: Share and Share Alike

For the largest enterprises, access to the source code of their enterprise resource planning applications is a given. The critical nature of ERP, the...

IT Sense and Sensibility

I spent a few days in The Netherlands before heading over to the big CeBIT computer show in Hannover, Germany. Other than concluding that New...

Petcos New Storage Gear Is the Cats Meow

Whether the objects of their affection are cats or dogs, fish or ferrets, all sorts of pet lovers go to Petco Animal Supplies to...