Showing results 1 to 20 of 320


ClockAxon is a free software solution designed to synchronize time in your computer network. The software polls the standard time from...

2 days ago By Geneosoft

iNet - Network Toolbox

iNet - explore your network!Find out about security risks and keep your network under control. With iNet you know exactly what's going...

January 28, 2015 By Banana Glue

Bring apps to big data, not vice versa

Ever-increasing amounts of big data have many tech insiders wondering how the data will affect network demands, datacentres and computer infrastructures, going forward.

June 20, 2012

Nortel systems 'compromised for nine years'

Computer systems at telecoms equipment manufacturer Nortel systems were compromised by hackers for around nine years, according to a report in the Wall Street Journal.Hackers used seven passwords stolen from executives to access sensitive data on Nortel's corporate network, former Nortel systems security advisor Brian Shields told the publication.

February 14, 2012 by

Experiment probes USB keys lost on trains

The next time you find a lost USB key, bear in mind Paul Ducklin's little experiment before you plug it into your computer. He picked up 50 USB keys that were found on the Sydney RailCorp train network and discovered 66 per cent of them contained malware.

December 6, 2011 by

Hide My Ass throws light on 'LulzSec' logs

British virtual private network company Hide My Ass has said that it turned over logs on a suspected LulzSec member to the FBI in response to a UK court order.The court order requested information related to an account associated with a number of attacks on computer systems, Hide My Ass said in a blog post on Friday.

September 27, 2011 by

Reddit co-founder charged with hacking MIT

Aaron Swartz, co-founder of popular social sharing site Reddit, has been indicted on charges of stealing millions of documents from the Massachusetts Institute of Technology.The charges, filed by the United States Attorney for the District of Massachusetts and unsealed on Tuesday, allege that Swartz broke into a restricted area of MIT and accessed its computer network to steal over four million documents from the JSTOR academic paper service.

July 19, 2011 by

Cutting the (power) cord

This question always pops into my head whenever I am roaming an airport desperately seeking a place to recharge my notebook computer and other gadgets: why is it that I can get all sorts of network "juice" via wireless means, while I have to rely on some cord to keep these darn things running?

May 11, 2011 by

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories