News

News

  • March 23, 2006 23 Mar'06

    Phishers techniques for email harvesting

    Discover the harvesting tools and techniques phishers use for email harvesting and where and who they target.

  • March 23, 2006 23 Mar'06

    How phishers send anonymous email

    Learn how factors, such as Proxy chains and location, help phishers to successfully send anonymous email; and why onion-routing may hinder tracking of these offenders.

  • March 23, 2006 23 Mar'06

    Phishers, hackers and insiders

    Discover how phishers are now using hacking techniques and are teaming up with insiders to access not only your email address but your personal information as well.

  • March 23, 2006 23 Mar'06

    Sending spam; phishing tools of the trade

    Learn about the popular bulk-mailing tools that aid phishers in doing in their job.

  • March 20, 2006 20 Mar'06

    E-mail storage outsourcing gets mixed reaction

    Some users think it might be cumbersome to have a separate vendor manage just one part of their environment, while others jump at the idea of off-loading e-mail management.

  • Sponsored News

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    • Improve Security with Managed File Transfer

      File transfer is one of the vital functions of B2B collaboration. Organizations require safe, secure and compliant file transfer in order to drive revenue, satisfy customer requirements and enable effective collaboration across the entire B2B value chain. See More

    • Leveraging Cloud Models to Simplify B2B Collaboration

      Reducing complexity in managing business-to-business integration is one of the primary challenges for IT teams. With the growth of the Internet of Things (IoT), social networking and big data analytics, the need to simplify partner interactions and automate processes is becoming more critical than ever. By simplifying B2B collaboration, IT can reduce costs, enhance partner and customer experiences, and leverage real-time visibility and analytics to drive business innovation. See More

    View All Sponsored News
  • March 16, 2006 16 Mar'06

    Ascendent acquisition extends desk phone to BlackBerry

    A week after paying out $612.5 million to end a patent infringement suit, BlackBerry maker Research In Motion Ltd. acquired Ascendent Systems to make the desk phone mobile.

  • March 14, 2006 14 Mar'06

    Firm offers smaller companies an e-mail audit trail

    Recombo says its new software can help smaller companies track critical documents through e-mail, although some firms may find there's still no substitute for old-fashioned wet-ink signatures.

  • March 13, 2006 13 Mar'06

    Part 3: Propagating permissions from a parent Exchange public folder to all subfolders

    In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically...

  • March 12, 2006 12 Mar'06

    Part 4: Related links on Exchange public folder management

    In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically...

  • March 12, 2006 12 Mar'06

    Part 1: Creating an Exchange public folder tree structure

    In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically...

  • March 12, 2006 12 Mar'06

    Part 2: Customizing Exchange public folder roles and permissions

    Learn how to customize Exchange public folder roles and permissions to suit your company's needs in part 2 of our Exchange Public Folder Permissions Tutorial.

  • March 06, 2006 06 Mar'06

    Napa Valley winery converts to e-mail archive

    Vendors are hyping e-mail, but as with Foster's Wines, it often takes a big restoration failure before an archive is considered -- and it might not get implemented right away.

  • March 06, 2006 06 Mar'06

    Proof-of-concepts heighten mobile malware fears

    By themselves, Crossover and RedBrowser are fairly harmless, but they're a sign that the digital underground is likely working toward large-scale attacks against handheld devices.

  • March 06, 2006 06 Mar'06

    RIM settles with NTP, spares BlackBerry partners

    RIM has settled the ongoing patent infringement suit with NTP Inc. for $612.5 million. The settlement gives RIM and its partners, carriers and service providers full use of the company's BlackBerry mobile push e-mail platform.

  • February 28, 2006 28 Feb'06

    Opinion: Why Exchange Unified Messaging is worth paying attention to

    In addition to e-mail, Microsoft is designing the next version of Exchange Server to support voice mail and fax. Redmond is calling this new Exchange 12 collaborative feature Exchange Unified Messaging.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close