Recent Articles

Hackers Attack The LHC
The shiny new Large Hadron Collider has been hacked, with hackers taking over the Compact Muon Solenoid detector. The hacker group 2600 of the Greek Security Team has claimed responsibility. While this is...

Update Your System To Prevent DNS Exploits
HD Moore has released an exploit module for the Metasploit framework, meaning script kiddies and every other security person and wanna be is going to...

FCC Declares Comcast's Filtering Illegal
It's official, as far as the FCC is concerned, that Comcast's throttling of peer-to-peer traffic was illegal and in violation of the FCC's network neutrality principles.

EFF Launches Net Neutrality Tool
The Electronic Frontier Foundation has introduced a new tool that allows users to find out if their ISPs are throttling their P2P files. The new "Switzerland Tool" will reveal if a user's network connection has any...

SQL Server Upgrade Database Mirroring Issues
Before upgrading our production servers I simply removed the mirroring with the wizard. After the upgrade process the last step was to recreate the mirroring.

Reactions To European Telecommunications Packet...
Today the European Parliament is going to vote on proposed amendments to the telecommunications packet regulation, below an excerpt of FFII press release and Kathy Sinnott reactions. European Parliament...

RIAA Demands ISP's To Spy On Their Users
ISP's are beginning to bow to RIAA demands and spying on their users. This is odd if you consider them a communications company... like the telephone companies are. For example, do you talk on...


Decrease In Network Security Attacks

By Bill Ives

The Aberdeen Group just told me that they released a free report on a decrease in network threats. The highlights are:

Best-in-Class companies reported a year over year decrease of 8.6% in network security attacks.
Best-in-Class companies reported a year over year decrease of 7.3% in all application security attacks
11.9% of Best-in-Class reported a decrease in successful Application Security Attacks.

The summary went on to say. "Network defense technologies have matured to remove the "low hanging fruit" of network vulnerabilities but in the never ending, cat-and-mouse game of network security, network attacks have moved up the OSI layers, all the way to Layer 7, targeting the applications themselves. In response, organizations are increasingly deploying secure application development and deployment methodologies to supplement and aid in meeting compliance and IT security requirements."

When I became an enterprise of one, my PC was exposed to all kinds of attacks that brought it down. So I got a Mac. So far the attackers have not found it or the protection is better. There is a lot of attention on enterprise security. I wish someone would do a study on the security issues faced by individuals like myself.


About the Author:
Dr. Bill Ives is an independent consultant and writer who has worked with Fortune 100 companies in business uses of emerging technologies for over 20 years. For several years he led the Knowledge Management Practice for a large consulting firm.. Now he primarily helps companies with their business blogs. He is also the VP of Social Media and blogger for TVissimo, a new TV schedule search engine. Prior to consulting, Dr. Ives was a Research Associate at Harvard University exploring the effects of media on cognition. He obtained his Ph. D. in Educational Psychology from the University of Toronto. Bill can be reached at his blog: Portals and KM. He also writes for the FastForward blog and the AppGap blog.

Planet Alpha Dedicated Servers

Google's Wireless Network Patent

By Andy Beal

While we all thought Google's Android was merely a way for Google to make it easier for is AdWords ads to appear on your cell phone, a new patent filing could reveal a larger goal.

A bidding system where wireless providers bid to offer the lowest calling rates for your unlocked cell phone.

Here's how ComputerWorld describes the new Google patent application:

...When at home, the device would attach to the user's Wi-Fi network...But once outside, the device could periodically search for other available service providers, asking the service providers to bid for the chance to offer service to the customer. The device could automatically switch to the network that has the best price without interrupting a user's voice call or data connection.

On the back end, a program on the phone could contact each of the available networks individually, or the phone could instead communicate with a central server that handles the negotiations with each service provider.

I'm guessing that "central server" might be called AdWords. ;-)

Like many of Google's patent application, this might not ever see the light of day, but what a cool concept.

Would you be in favor of a system that lets wireless providers compete for your calls?


About the Author:
Andy Beal is an internet marketing consultant and considered one of the world's most respected and interactive search engine marketing experts. Andy has worked with many Fortune 1000 companies such as Motorola, CitiFinancial, Lowes, Alaska Air, DeWALT, NBC and Experian.

You can read his internet marketing blog at Marketing Pilgrim and reach him at
About NetworkNewz
NetworkNewz editors, writers and contributors focus on both the big picture and the details of networking. At NetworkNewz our goal is to deliver to you The Key To Network Management.

NetworkNewz is brought to you by:

-- NetworkNewzis an iEntry, Inc. publication --
iEntry, Inc. 2549 Richmond Rd. Lexington KY, 40509
2008 iEntry, Inc. All Rights Reserved Privacy Policy Legal

archives | advertising info | news headlines | newsletters | comments/feedback | submit article

The Keys To Network Management Ask Questions in the Networking Forum NetworkNewz News Archives About Us Feedback NetworkNewz Home Page About Article Archive News Downloads WebProWorld Forums Jayde iEntry Advertise Contact