Date: | Mon, 06 Dec 2004 12:03:07 -0500 (EST) |
From: | "Network Computing Newsletter" <NetworkComputing@update.networkcomputing.com>
| Subject: | Network Computing Report #380 -- Network Forensics |
Network Computing Report #380
http://www.networkcomputing.com/
Monday, December 6, 2004
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
Join InformationWeek for a FREE on-demand TechWebCast on
Fusing CRM and BPM to Build a More Profitable Enterprise.
Join us for an interactive discussion on the opportunities
and challenges posed by BPM technology, process scripting,
call scripting, and their benefits to your organization.
Register and view now:
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0Ccxa0AV
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
In This Issue:
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
1) Network Forensics
- Review: Network Forensic Tools
- Feature: Network Forensics: CSI: Enterprise
- TechQuiz: Incident Response Preparedness
2) Reviews and How-Tos
- Quick Review: BlackBerry 7100t
- Sneak Preview: Cisco's Integrated Services Routers
- Sneak Preview: Symantec's LiveState Recovery Suite 3.0
- Workshop: Adding 'Quality' to Wireless LANs
- Interactive Buyer's Guide: SAN Fibre Channel Switches
- Secure Enterprise: From the Top: The Forgotten Pillars of
Enterprise Security
- Secure Enterprise: Make It and Break It: Preventing Session
Hijacking and Cookie Manipulation
3) Reader Reverb
- CEO Minute: SMARTS
- Top 11: Bad Training
- Call for Entries: 2005 Predictions
- E-Poll: Desktop Management
- Last Mile: Tech the Halls
- Top Stories
4) The Daily Blog
- Targeted Advertising
- More Than Meets the Eye
5) Your Monday IT Briefing
- Bad, Bad Bots
- SAML: The Secret to Centralized Identity Management
- Nine Habits of Highly Effective BPM Projects
- Enterprise Router Shipments Increase 10 Percent, But Revenue Drops
- Where Will RBOC Lobbyists Strike Next?
- Linward, March!
- Unleashing Business Power With IT
6) Opinion
- BuzzCut: Ghost of Commerce One Looms Over Web Services
- BuzzCut: HP Gives App Servers Another Try
- BuzzCut: Don't Cede Search Market to Microsoft Yet
- Down to Business: Novell's Temperate Tone
- Secure Enterprise: The Payoff: Hennsler Financial
7) Coming Events
- IP Communications: Benefits and Considerations
- Business Intelligence for the Real-time Enterprise
- Best Practices for Managing Instant Messaging in the Enterprise
8) CMP MarketPlace
9) Subscription Information
Look for the next Network Computing Report newsletter on Monday,
December 13, 2004!
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
1) Network Forensics
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
a) Review: Network Forensic Tools
By Marisa Mack
We tested a range of investigative tools, from full-featured remote
image acquisition products to specialized apps that can dig deep into
text or mail stores. Find out which ones will make you into an IT Super
Sleuth!
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lg0A3
b) Feature: Network Forensics: CSI: Enterprise
By Marisa Mack
Agent Gil Grissom isn't standing by to investigate your info-security
incidents. Having an incident-response policy and designated team in
place before a security breach occurs will protect your company's
assets
and reputation.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lh0A4
c) TechQuiz: Incident Response Preparedness
When it comes to responding to security breaches, are you and your
organization prepared? Take our latest quiz on incident response
readiness to see if you're up to the challenge. If you can outsmart our
editors, we'll throw your name into the hat for a free NWC collectible
pen/stylus.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0TNs0Aj
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
2) Reviews and How-Tos
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
a) Quick Review: BlackBerry 7100t
Certainly Research In Motion has leapt successfully beyond the flat
tablet BlackBerry with its new, more phone-like 7100t. In our testing,
we found the new device very capable of pleasing both the trendiest
technophiles and the most demanding IT professionals. However,
traditional BlackBerry users looking for a straight upgrade will find
lingering quirks and a few new tricks to learn.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Li0A5
b) Sneak Preview: Cisco's Integrated Services Routers
By Sean Doherty
These new Services Routers bring together IP telephony, intrusion
protection and data for a highly integrated router, all managed from
the
easy-to-use Security Device Manager.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lj0A6
c) Sneak Preview: Symantec's LiveState Recovery Suite 3.0
By Pete Payne
Symantec's updated suite provides comprehensive local and remote backup
for the enterprise. But what's missing, and how will it affect you?
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lk0A7
d) Workshop: Adding 'Quality' to Wireless LANs
By Dave Molta
Everyone knows QoS is a growing concern for today's multimedia
networks--but what about wireless? With its shared-media architecture
and specialized protocols for mobility, the wireless LAN presents
unique
challenges with QoS. We examine proprietary and standards-based
approaches to solving this problem.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Ll0A8
e) Interactive Buyer's Guide: SAN Fibre Channel Switches
Research today's hottest SAN Fibre channel switches with our
interactive
guide. Compare over a dozen products from storage companies like CNT,
Emulex, McData, QLogic and more to help with your product selection.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lm0AA
f) Secure Enterprise: From the Top: The Forgotten Pillars of Enterprise
Security
By Brooke Paul
Ask the average office worker about security, and he will tell you it's
about "keeping secrets" or "stopping the bad guys." He's right--but
only
partly.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Ln0AB
g) Secure Enterprise: Make It and Break It: Preventing Session
Hijacking
and Cookie Manipulation
By Marco Morana
Web app developers can make their applications secure by design by
protecting Web authentication from credentials eavesdropping, cookie
manipulation and session hijacking.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lo0AC
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
3) Reader Reverb
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
a) CEO Minute: SMARTS
Tune in to hear Bruce Boardman talk with Dr. Shaula Alexander Yemini,
founder and president of service-centric management vendor, SMARTS.
Hear
how SMARTS intends to correlate information across multiple management
silos (infrastructure, applications, business services, etc.) to
guarantee service. Plus, find out if you need an IT service management
solution.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lp0AD
b) Top 11: Bad Training
This week, we're looking for the "Top 11 signs you're attending a bad
Windows admin training course." Make us chuckle heartily, and we'll
post
your entry in print and online. Here are a couple of notions sent in by
your fellow readers to get you started.
* Good morning and welcome to Linux 101... --Jeff Brittain
* Course prerequisite: You must have a system with a 5.25-inch floppy
drive so you can install Windows/386. --David G. Miller
* The lights dim in the room when you power up the server. --Jim Kiley
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0CEhF0AI
c) Call for Entries: 2005 Predictions
Help us ring in the New Year with your most likely and unlikely
networking predictions for 2005. Tell us what will most certainly take
place in IT in 2005 as well as what you'd like to see happen if you had
your druthers. We'll post our favorite responses online.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lq0AE
d) E-Poll: Desktop Management
Network Computing would like your input on desktop management issues
and
how they are affecting your organization. Please help us understand
your
concerns by taking our survey.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lr0AF
e) Last Mile: Tech the Halls
By Bradley F. Shimmin and Tim Wilson
This edition includes the Top 11 signs you're at a lame holiday IT
party, our holiday browser buyer's guide, and home computers of the
'future.'
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Ls0AG
f) Top Stories
Don't just take our word for it. Read the best stories on
NetworkComputing.com with our new Top Stories feature. Each day, we'll
tally the most read workshops, reviews, features and columns and then
list the most read stories.
http://www.nwc.com/
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
4) The Daily Blog
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
a) Targeted Advertising
Like most technology publications, we're always looking to expand our
advertiser base, obviously with the aim of bringing you, our readers, a
wider selection of relevant technology solutions. However, the
following
query may be taking that notion a bit too far...
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lt0AH
b) More Than Meets the Eye
If you're a child of the 80s (and a fan of the Transformers), or know
someone who was, you'll appreciate this car commercial from overseas.
If
it's not an amazing use of computer graphics, I don't know what is.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lu0AI
Read more entries from The Daily Blog.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0B5MU0An
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
5) Your Monday IT Briefing
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
Here are some of the must-read news stories we're following this week.
a) Bad, Bad Bots
Bold hackers are using their networking smarts to automate attacks and
break new ground in cybercrime.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C1Ql0AD
b) SAML: The Secret to Centralized Identity Management
Complicated by too many systems, too many applications and too many
passwords, identity management is a major headache for most
organizations. Can an intelligent, Web-services approach employing new
standards ride to the rescue?
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lv0AJ
c) Nine Habits of Highly Effective BPM Projects
1. Obtain executive sponsorship. Getting business executives behind the
effort is essential to initial success and taking BPM enterprisewide.
Get the other eight habits.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lw0AK
d) Enterprise Router Shipments Increase 10 Percent, But Revenue Drops
Report says that revenue for shipments won't return to 2003 levels
until
2007.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lx0AL
Get the latest news, reviews and trends by subscribing to the
Networking
Pipeline Newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0Cvfi0Ae
e) Where Will RBOC Lobbyists Strike Next?
After scoring big in Pennsylvania, RBOC lobbyists may be headed to a
statehouse near you.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Ly0AM
Stay out in front of all the latest Advanced IP news and views by
subscribing to the Advanced IP Pipeline Newsletter.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0CbkF0Ao
f) Linward, March!
Open-source software gains momentum with Intel support for Linux in
Asia, sharp growth for the Firefox browser and Novell's profitable move
to Linux.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0Cz8q0A5
g) Unleashing Business Power With IT
As Web services become more pervasive they are changing the way
business
decisions are made and implemented. Business leaders who are not aware
of SOAs will likely lose a competitive edge in the marketplace.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2Lz0AN
You can find links to these and other breaking news stories organized
by
technology via our handy NetNews Service.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0CJp80AH
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
6) Opinion
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
a) BuzzCut: Ghost of Commerce One Looms Over Web Services
By Tim Wilson
39 of the company's e-commerce technology patents are being auctioned
off in bankruptcy court. Could they be used in infringement lawsuits
against today's Web services technology vendors?
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L10AA
b) BuzzCut: HP Gives App Servers Another Try
By Richard Hoffman
HP will package the JBoss app server with its own servers and
professional services to give users a one-stop shopping experience--and
to compete with IBM.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L20AB
c) BuzzCut: Don't Cede Search Market to Microsoft Yet
By Rob Preston
Some pundits have predicted that MSN Search will wipe Google off the
map, like Internet Explorer did to Netscape. We say, "Don't be so
hasty."
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L30AC
d) Down to Business: Novell's Temperate Tone
By Rob Preston
No longer out to beat Microsoft, Novell's more measured approach to
business is one that IT pros can learn to emulate.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L40AD
e) Secure Enterprise: The Payoff: Hennsler Financial
By Ted Kemp
The money management and financial advisory firm spent $6,000
automating
a manual process for auditing data--a move that has reaped as much as
$100,000 in savings.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L50AE
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
7) Coming Events
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
a) IP Communications: Benefits and Considerations
Wednesday, December 15, 2004
9:00 AM PST / 11:00 AM CST / 12:00 PM EST
Want to learn more about the benefits and direction of IP-based
communication, migration strategies and security requirements? Register
and attend this interactive event to learn more on this hot topic and
to
speak with industry leaders during a live question and answer period.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C14m0Aj
b) Business Intelligence for the Real-time Enterprise
Wednesday, December 15, 2004
10:00 AM PST / 12:00 PM CST / 1:00 PM EST
RTE (Real-Time Enterprise) capability is rapidly changing the landscape
in the business intelligence marketplace. Join us and learn how sales
and support personnel in the field receive relevant, up-to-the-minute
information that enables them to take immediate action to respond to
sales opportunities, resolve customer issues and increase revenue.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L60AF
c) Best Practices for Managing Instant Messaging in the Enterprise, an
Essential IT Initiative for 2005
Thursday, December 16, 2004
11:00 AM PST / 1:00 PM CST / 2:00 PM EST
As IM (Instant Messaging) quickly gains popularity, enterprises need to
address the potentially costly challenges it brings to the workplace.
Register now to understand the benefits of IM, reduce the legal
implications of its use and be informed and ready to address security
threats. In this Webcast, you will learn how to maximize the business
potential of IM technology while establishing and enforcing essential
rules and policies to protect your company.
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0C2L70AG
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
8) CMP MarketPlace
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
Join InformationWeek for a FREE on-demand TechWebCast on
Fusing CRM and BPM to Build a More Profitable Enterprise.
Join us for an interactive discussion on the opportunities
and challenges posed by BPM technology, process scripting,
call scripting, and their benefits to your organization.
Register and view now:
http://update.networkcomputing.com/cgi-bin4/DM/y/ekzZ0GO4rP0G4g0Ccxa0AV
~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-~-
Put Us On Your White List
Don't let an over-eager e-mail filter bounce the Network Computing
Report newsletter! Our address:
NetworkComputing@update.networkcomputing.com
needs to be in your address book or on your anti-spam white list.
Ask your admin or ISP how to do this, or check your anti-spam utility
documentation.
As always, we welcome your feedback about our newsletter. Please
feel free to message us directly if you have any comments or
questions (mailto:newsletter@nwc.com).
Important subscription contacts:
CMP Media LLC
600 Community Drive
Manhasset, NY 11030
Change your e-mail address.
http://networkcomputingsubscriptions.com/customerservice/
Sign up for your own issue of this newsletter.
http://www.submag.com/sub/nc?wp=wpdly2
Subscribe to Network Computing newsletters.
http://www.submag.com/sub/nc?wp=wpdly2
Still not receiving your own FREE subscription to Network Computing
magazine?
http://networkcomputingsubscriptions.com/customerservice/
Note: This newsletter utilizes dynamic URLs. For more information,
please refer to our privacy policy.
http://www.doubleclick.net/us/corporate/privacy
Copyright (c) 2004 Network Computing, a CMP Media LLC publication
http://www.nwc.com/
This message powered by DARTmail
http://www.doubleclick.net/us/corporate/privacy