Ascii+network+false+responsibility

Showing results 1 to 20 of 22

Hacker claims Chinese defense contractor breach

update Hacker under pseudonym "Hardcore Charlie" claims responsibility for breaching network of China's National Electronics Import & Export Corporation and stole documents to post online, report states, but company refutes claims of attack.

April 4, 2012 by

Filtering is the job of ISPs not NBN: govt

Although it was technically possible for the National Broadband Network Company (NBN Co) to filter internet content over the heads of internet service providers (ISPs), the government has said that it will still force the responsibility onto ISPs.

July 19, 2011 by

Cellphones to detect dirty bombs?

Purdue University engineers are developing a system which would use a U.S. network of cellphones to detect dirty bombs and nuclear weapons. They say that 'such a system could blanket the nation with millions of cellphones equipped with radiation sensors able to detect even light residues of radioactive material.' They add that the extra circuitry wouldn't change much the thickness or the price of cellphones. They also say that these radiation-tracking cellphones could be customized to ignore some radioactive sources, like in hospitals. But you can imagine that such a network would probably trigger many false alarms. I'm also skeptical about the possibility of the integration of radiation sensors by manufacturers into their phones. But read more...

January 23, 2008 by

Stop the botnets!

This is the intention of Paul Barford, a computer scientist at the University of Wisconsin-Madison. He wants to build a new line of defense against malicious traffic which has become today a billion-dollar 'shadow industry.' As one of 'the most menacing aspects of botnets is that they can go largely undetected' by a PC owner, he developed a new computer security technique for detecting network intrusions. His system has a 99.9% detection rate of malicious signatures, roughly equivalent to some of the best commercial systems. But it has zero false positives when commercial systems have high numbers. This new system could soon be available commercially.

November 9, 2007 by

The future of net discrimination, brought to you by Comcast

Comcast admits to using "several network management technologies" to delay peer-to-peer traffic. Some of the methods are a little shady, such as sending false messages to clients telling them to abort transfers. If you ask me, they're targeting the wrong traffic, and going about it the wrong way. Is this the future of net "un-neutrality" that ISPs have in mind for us?

October 24, 2007 by

Does iPhone update 1.1.1 kill off 3rd party application development?

We were all warned by Apple and those of us who SIM unlocked our iPhones knew there was the risk that they could never be updated. Apparently, lots of people must have thought Apple's notice was just a false warning since they tried to update their iPhones anyways and turned them into iBricks. I knew better than to take another risk since I am very happy with my iPhone in its current state running on the T-Mobile USA network and made the decision to never update it unless there was a reliable hack I could trust not to brick it. Other than all the news surrounding the SIM unlock hack and iBricks, I think the bigger story of this latest iPhone 1.1.1 update may be the complete loss of 3rd party application support.

September 28, 2007 by

Telstra stands up for shareholders

update Telstra chief operating officer Greg Winn has denied the telco is being inflexible in its decision not to deploy a fibre-to-the-node network (FTTN) until it gets the right regulatory environment.Speaking at a Trans-Tasman Business Circle luncheon today, Winn said the telco had a responsibility to its shareowners and it took that very seriously.

April 29, 2007 by

Craigslist hoax empties house

Okay, a week ago, everyone was actually talking about the problem of false or mistaken identity, responsibility and lawbreaking. That important discussion died down, but the problem goes on.

April 5, 2007 by

CIO of the Year

Making sure that IT delivers is not easy, especially when it is a massive public transportation network that caters to more than two million users daily.Daniel Lai, who has been MTR's head of IT for the past seven years, takes this responsibility within his stride. He has a good track record of handling some of the toughest IT challenges; most recently being the Engineering Works and Traffic Information Management System (ETMS) project which clinched the Project of the Year award in the open industry category.

July 5, 2006 by

AAPT confident Alcatel deal will withstand rival dealings

AAPT is confident Alcatel's dealings with other telecommunications companies will not affect the AU$53 million partnership signed by the two companies June last year.The outsourcing agreement transferred the responsibility for the telecommunications company's network design and operations services to Alcatel.

April 15, 2004 by

Brave new world for Virgin Mobile Asia

Charged with the responsibility for building the world’s first multi-national Mobile Virtual Network Operator (MVNO), Ross Cormack is the chief executive of Virgin Mobile Asia, the billion dollar JV between Virgin and SingTel. Having served on the Boards of mobile operators such as HKT Mobile in Hong Kong and M1 in Singapore, Cormack is confident that the way to success lies in helping customers get the best out of their mobile experience.

June 1, 2001 by

When privacy is job No. 1

COMMENTARY--If you've spent more than a week as an IT professional, you're aware that security is a big part of everyone's job. From network administrators, who need to lock down computing resources both figuratively and literally, to end users, who should practice safe computing with antivirus software and keep passwords in their heads, everyone has a responsibility to protect a corporation's interests.

May 6, 2001 by

When privacy is Job 1

COMMENTARY--If you've spent more than a week as an IT professional, you're aware that security is a big part of everyone's job. From network administrators, who need to lock down computing resources both figuratively and literally, to end users, who should practice safe computing with antivirus software and keep passwords in their heads, everyone has a responsibility to protect a corporation's interests.

May 6, 2001 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories