Tech Companies

Recent Articles

  • Longhorn Looks Promising

    Back when Windows XP was still known by the code name Whistler, the most exciting thing about Microsoft Corp.’s client OS-in-progress was that it wasn’t Windows 9x. But now that Windows users can take for granted such basics as real multiuser support and relative freedom from blue screens of death, it will take a lot…

  • Symantec’s DeepSight Threat Management System

    Symantec Corp.’s DeepSight Threat Management System has added anti-virus data to its mix, bringing the product up to par with competitors. IT managers at large corporations that traditionally mine application and operating system vendor sites for known vulnerabilities should consider adding DTMS 5.0 to their security assessment tools. DTMS 5.0, which is an early-warning vulnerability…

  • Samba 3.0 Does Windows Better Than Before

    The latest version of Samba, the free software that provides systems running Linux and Unix with Windows-compatible file and print services, now works more closely than ever with Windows. Samba 3.0, which became available last month, enables machines to join an Active Directory domain as a native member and to authenticate users with LDAP and…

  • A Developer Looks at Panther

    When application developers open the stark black box containing the four CDs of Apple Computer Inc.’s “Panther” OS, they’ll get more than the newly polished end-user experience of what’s already the world’s most widely used version of workstation Unix. That fourth CD contains Xcode 1.0, Apple’s integrated development workbench for AppleScript, Java, and native C/C++/Objective-C…

  • Survey Says Developers Believe Linux Is More Secure

    Is Linux built more securely than Windows? According to a new survey, Windows and Linux developers both say yes—and for the first time, ranked it ahead of Windows XP. The September 2003 study from market-research firm Evans Data Corp. surveyed more than 500 North American participants, including VARs, ISVs, OEMs and corporate developers, according to…

  • Wireless Security: WPA Step by Step

    Even if you’ve enabled WEP (Wired Equivalency Protocol) encryption on wireless networks, odds are that they’re still not secure. WEP’s flaws are well documented. Hackers can break WEP easily. What you need is WPA (Wi-Fi Protected Access), a far stronger protocol that fixes the weaknesses in WEP. Here we’ll take you through the process of…

Get the Free Newsletter

Subscribe to Channel Insider to be informed on the changing IT landscape.

You must input a valid work email address.
You must agree to our terms.