When I wrote this previous blog "Hack most wireless LANs in minutes!" which mostly focused on insecure corporate wireless LANs, it seemed to generate more questions than answers which is typical every time I go in to this topic.
Real World IT
George Ou's networking and security insights keep enterprise managers in the know and vendors up at night.
Even after two years of WPA certification and nearly one year after 802.11i ratification, you might be wondering why I'm still talking about WEP encryption.
Two weeks ago at the Internet Telephony Conference & Expo in Miami, I had the pleasure of moderating the open source and telephony roundtable discussion with some of the key players in the business. The panel included Mark Spencer, creator of Asterisk and CEO of Digium; Bill Rich, CEO of Pingtel; and Alan Hawrylyshen, CTO of Jasomi Networks.
We like to poke fun at people who continue to foolishly click on those e-mail attachments that keep infecting them over and over again. The last thing you would expect are security products -- designed to protect us from infected email in the first place --that foolishly open up e-mail attachments that can infect them.
After reading David Berlind's blog and listening to his podcast about a potential contender to Microsoft Exchange server, Scalix sounded almost too good to be true. As someone who's overseen and designed many Microsoft Exchange installations with hundreds or thousands of users, I have always been haunted by several issues related to any Exchange contender.
David Berlind posted this interesting blog on an Exchange server and Outlook client alternative from the company Scalix. Since Microsoft avoided going to aSQLdatabase backend with their soon to be released Exchange 2005, this leaves the door open for a more scalable challenger.
David Berlind did this excellent interview with Wolfgang Gentzsch, who is one of the pioneers of grid technology,anddispels some of the myths of grid computing. In the past, I've tried to dispel some of the grid mystique myself but it's been a challenge to get the point across.
In recent news on Quantum cryptography, a company is pushing Quantum cryptography into the mainstream. Without judging the particular company, Cavium, or the merit of their products, I will say that people in general have huge misconceptions about cryptography and they need to be aware of them when theyevaluate security products.
I have a very simple question forthose who either propagate or agree with the concept that monoculture is dangerous. If an organization was running all Linux on their desktops and servers, would you tell them that they have a big monoculture problem and they should immediately convert half of their desktops and servers to Windows XP and Windows 2003 in the name of cyber diversity?
In a recent story on a McDonald's pilot project that leverages DSL, the public Internet, and VoIP,thefast food chainseeks to gain efficiency by consolidating drive-through order takers to a centralized call center. Based on the results, the project illustrates why the "IP" in VoIP still stands more for "Internet Protocol" and not the "public Internet" as far as serious business telephony deployments are concerned.