News

News

  • March 23, 2006 23 Mar'06

    Phishers techniques for email harvesting

    Discover the harvesting tools and techniques phishers use for email harvesting and where and who they target.

  • March 23, 2006 23 Mar'06

    How phishers send anonymous email

    Learn how factors, such as Proxy chains and location, help phishers to successfully send anonymous email; and why onion-routing may hinder tracking of these offenders.

  • March 23, 2006 23 Mar'06

    Phishers, hackers and insiders

    Discover how phishers are now using hacking techniques and are teaming up with insiders to access not only your email address but your personal information as well.

  • March 23, 2006 23 Mar'06

    Sending spam; phishing tools of the trade

    Learn about the popular bulk-mailing tools that aid phishers in doing in their job.

  • March 20, 2006 20 Mar'06

    E-mail storage outsourcing gets mixed reaction

    Some users think it might be cumbersome to have a separate vendor manage just one part of their environment, while others jump at the idea of off-loading e-mail management.

  • Sponsored News

    • Discovering the Business Value of Streaming Analytics

      With streaming analytics you can solve business problems in new ways and seize new revenue opportunities. You can reduce costs and increase efficiency while improving the safety of employees and the security of assets and intellectual property. See More

    • Three Use Cases for Interactive Data Discovery and Predictive Analytics

      Interactive data discovery and predictive analytics technologies allow business users and analysts to identify important trends and relationships in data sets and drill down into questions from any angle. They also allow business users to collaborate with specialists to create, refine and select the best predictive models. See More

    • Better Together: Hadoop and Your Enterprise Data Warehouse

      You’re getting started with a big data analytics project on Hadoop and are impressed by the cost savings on storage compared with your data warehouse. You’ve read that TrueCar, a company that collects vast volumes of car price data for its online car-buying business, has cut its monthly data storage cost from $19/GB to $0.23/GB. So you’re wondering, should you consider moving all your business intelligence efforts to Hadoop? See More

    • Five Steps to Maximizing the Value of Hadoop

      You want to get started with a big data project at your company, but you're unfamiliar with Hadoop and you're unsure your project will deliver value. Relax. Many organizations are struggling to implement Hadoop for a variety of reasons. In "The Current State of Hadoop in the Enterprise," by the International Institute for Analytics and sponsored by SAS, you'll find a handy list of five steps to maximize the value of a Hadoop big data project for your organization. See More

    View All Sponsored News
  • March 16, 2006 16 Mar'06

    Ascendent acquisition extends desk phone to BlackBerry

    A week after paying out $612.5 million to end a patent infringement suit, BlackBerry maker Research In Motion Ltd. acquired Ascendent Systems to make the desk phone mobile.

  • March 14, 2006 14 Mar'06

    Firm offers smaller companies an e-mail audit trail

    Recombo says its new software can help smaller companies track critical documents through e-mail, although some firms may find there's still no substitute for old-fashioned wet-ink signatures.

  • March 13, 2006 13 Mar'06

    Part 3: Propagating permissions from a parent Exchange public folder to all subfolders

    In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically...

  • March 12, 2006 12 Mar'06

    Part 4: Related links on Exchange public folder management

    In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically...

  • March 12, 2006 12 Mar'06

    Part 1: Creating an Exchange public folder tree structure

    In this four-part tutorial, SearchExchange.com contributor Brien Posey explains how to create a simple Exchange 2003 public folder tree structure, customize Exchange public folder roles and permissions to suit your company's needs, and automatically...

  • March 12, 2006 12 Mar'06

    Part 2: Customizing Exchange public folder roles and permissions

    Learn how to customize Exchange public folder roles and permissions to suit your company's needs in part 2 of our Exchange Public Folder Permissions Tutorial.

  • March 06, 2006 06 Mar'06

    Napa Valley winery converts to e-mail archive

    Vendors are hyping e-mail, but as with Foster's Wines, it often takes a big restoration failure before an archive is considered -- and it might not get implemented right away.

  • March 06, 2006 06 Mar'06

    Proof-of-concepts heighten mobile malware fears

    By themselves, Crossover and RedBrowser are fairly harmless, but they're a sign that the digital underground is likely working toward large-scale attacks against handheld devices.

  • March 06, 2006 06 Mar'06

    RIM settles with NTP, spares BlackBerry partners

    RIM has settled the ongoing patent infringement suit with NTP Inc. for $612.5 million. The settlement gives RIM and its partners, carriers and service providers full use of the company's BlackBerry mobile push e-mail platform.

  • February 28, 2006 28 Feb'06

    Opinion: Why Exchange Unified Messaging is worth paying attention to

    In addition to e-mail, Microsoft is designing the next version of Exchange Server to support voice mail and fax. Redmond is calling this new Exchange 12 collaborative feature Exchange Unified Messaging.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close