DoS Attacks

Denial-of-service attacks make computer networks unavailable to their intended users. There are many variations, but DoS attacks generally occur when system elements are bombarded by an endless stream of specially formed messages. Botnets often are used to do this. The more collaborative nature of Web 2.0 actually increases the opportunities for those interested in launching such attacks. The best way to avoid falling prey to DoS attacks is to write good code.


Will Social Networking and Unified Communications Compete, Coexist or Cooperate?

It is entirely possible that the emergence of social networking is what ends up saving UC. More >

Microsoft, Google Help Create Ethernet Consortium for Clouds

Broadcom, Mellanox and Arista are other founders of the group that has developed a spec for 25GbE and 50GbE. More >

World Cup Spurs Cyber-Attacks, Digital Protests

Cyber-criminals use the quadrennial soccer contest as a phishing lure for unsuspecting victims, while Anonymous supports domestic protesters by defacing Web sites and by launching denial-of-service attacks. More >

More Articles >


Patent Litigation Has Huge Ramifications for Open Source

Lora Bentley spoke with Dean Drako, CEO, Barracuda Networks. The open source security appliance company is currently involved in patent litigation with competitor Trend Micro over antivirus More >

Are Rootkits the Biggest Security Threat?

With Jim Gildea, director of North American Marketing, Grisoft.   Question: What is the difference between a traditional virus and a rootkit?Gildea: Viruses are more common afflictions to More >

The Desktop Security Landscape Changes

Carl Weinschenk spoke with Jon Oltsik, senior analyst, Enterprise Strategy Group.   Weinschenk: What is changing about desktop security?Oltsik: A couple of things. One is that the threat More >

More Interviews >

Resource centers

Business Intelligence

Business performance information for strategic and operational decision-making


SOA uses interoperable services grouped around business processes to ease data integration

Data Warehousing

Data warehousing helps companies make sense of their operational data

Editor's Choice

2015 Wearable Tech Trends: Swank Meets Science

Security Staffing

Tech companies and fashion designers both seem to agree that the wearables of tomorrow will likely be fashion that incorporates technology instead of the other way around.

 More > Unifies File Access Across the Cloud

For Your Holiday Reading List: ‘Geeks, Mush Heads and the IT Revolution’

Apigee Bolsters API Analytics

Mobile Apps Potentially Help Save Lives


Articles  |  Interviews  |  Guest Opinions  | Slideshows

Related IT Downloads

Job Description: AV Technician Job Description: AV Technician

A job description for an AV Technician....

Test Plan Template Test Plan Template

This template provides a structured approach to testing for a product release or other deliverables....

The Twelve Scams of Christmas The Twelve Scams of Christmas

As cybercriminals begin to take advantage of the holiday season, McAfee, Inc. reveals risks to watch out for....

SQL Injection Attacks and Defense Book Excerpt SQL Injection Attacks and Defense Book Excerpt

Get a clear understanding of this emerging tactic for hackers to gain access to your precious data....

More IT Downloads>

Subscribe to our Newsletters

Sign up now and get the best business technology insights direct to your inbox.


Thanks for your registration, follow us on our social networks to keep up-to-date