[ Home | Liste | F.A.Q. | Risorse | Cerca... ]


[ Data: precedente | successivo | indice ] [ Argomento: precedente | successivo | indice ]


Archivio: Gennaio 2002 ml@sikurezza.org
Soggetto: Fw:      ACM TechNews - Wednesday, January 23, 2002
Mittente: Raistlin
Data: 25 Jan 2002 18:37:30 -0000
> "Bush Administration Urged to go High-Tech on Terrorism"
> The Progressive Policy Institute issued several reports
> indicating that the next terrorist attack can only be thwarted if
> the Bush administration formulates a solid plan for putting the
> latest technology and information-sharing tools in the hands of ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item2
> 
> "Asian Enterprises Turn to Linux"
> More and more firms in Asia are turning to Linux-based operating
> systems to run their server applications.  According to a report
> by Gartner Asia-Pacific, 15 percent of firms in the region (with
> the exception of Japan) used Linux in 2001's fourth quarter, ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item4
> 
> "Red Hat's Significance for AOL"
> Recent media reports that Red Hat, a major distributor of the
> open-source Linux computer operating system, may be purchased by
> the media behemoth AOL Time Warner could indicate that AOL is
> implementing a new campaign in its ongoing rivalry with ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item6
> 
> "GovNet: What Is It Good For?"
> GovNet, proposed by President Bush's cybersecurity adviser,
> Richard Clarke, is getting little support from security experts
> and the intelligence community, who say that existing networks
> can adequately be used to fulfill its intended function--to allow ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item8
> 
> "Programmers Could Thwart Hacker Attacks With Smarter Software"
> AT&T Labs researcher Avi Rubin believes that training smarter
> software programmers can foil hackers.  He cites the buffer
> overflow security hole in AOL's Instant Messenger program as
> proof that better programmers are needed.  "There's no excuse for ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item9
> 
> "Exploding Chips Could Foil Laptop Thieves"
> University of California, San Diego researcher Michael Sailor and
> colleagues have developed a way to make silicon chips explode via
> an electrical signal.  Such technology could be used to destroy
> circuitry in stolen machines, according to the team.  The ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item13
> 
> "MS Refocuses on Software Pirates"
> At a recent press conference, Microsoft anti-piracy manager Diana
> Piquette accused software pirates of using their profits to
> support terrorist organizations and organized crime.  Among
> incidences she cited were a Paraguayan counterfeiter who ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item14
> 
> "Security Vs. Privacy"
> The American Association of Motor Vehicle Administrators this
> week is expected to introduce a proposal to issue drivers'
> licenses with biometric identifiers.  However, the plan faces
> considerable privacy and technical hurdles, especially with ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item16
> 
> "Software Liability Gaining Attention"
> Until now, software security breaches such as Nimda or Code Red
> have had little impact on software vendors.  Venders are
> protected by software user agreements, and few lawsuits have been
> filed.  However, legal experts believe that consumers will ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item17
> 
> "The Road to Secure Web Services"
> The emergence of Web services means that new security solutions
> will be needed for the next big thing in Internet-based
> applications and transactions.  Although Web services take
> advantage of user IDs, passwords, access control lists, file ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item18
> 
> "Patching Holes in Cyber-Space"
> President Bush's cybersecurity advisor Richard Clarke is urging
> software companies to distribute software patches to customers
> and implement rapid closure of security holes.  If such flaws
> cannot be rectified in a timely manner, an administration ...
> http://www.acm.org/technews/articles/2002-4/0123w.html#item19



________________________________________________________
http://www.sikurezza.org - Italian Security Mailing List




[ Home | Liste | F.A.Q. | Risorse | Cerca... ]

www.sikurezza.org - Italian Security Mailing List
(c) 1999-2005