Network World
Thursday, April 24, 2014
DNSstuff.com
Get information about your IP
IP Information
50+ On-demand DNS and network tools
Error 404--Not Found

Error 404--Not Found

From RFC 2068 Hypertext Transfer Protocol -- HTTP/1.1:

10.4.5 404 Not Found

The server has not found anything matching the Request-URI. No indication is given of whether the condition is temporary or permanent.

If the server does not wish to make this information available to the client, the status code 403 (Forbidden) can be used instead. The 410 (Gone) status code SHOULD be used if the server knows, through some internally configurable mechanism, that an old resource is permanently unavailable and has no forwarding address.

Security Notes

Related links

Security Notes RSS feed

E-mail Ellen Messmer

Security forum
Discuss Security Notes and other Security topics.

Security Notes archive



July 20, 2006

Entrust snaps up Business Signatures

Entrust today announced it closed a deal last night to buy Redwood City, Calif.-based Business Signatures for $50 million.

Read more

Comments (0) | Permanent link


July 19, 2006

For he's a jolly good "Technical Fellow"

"Technical Fellow" is the new job title for Mark Russinovich, co-founder of Winternals with Bryce Cogswell. Yesterday Microsoft announced it acquired Winternals for an undisclosed sum, and is taking Russinovich on board as a "Technical Fellow."

Read more

Comments (0) | Permanent link


July 18, 2006

Security and mobile computing

Mobile computng, especially when associated with the plethora of handheld devices on the market today, is a network manager's headache when it comes to security. Network World editor John Cox gives a summary of the pain points and some possible remedies in an article this week on the subject

Read more

Comments (0) | Permanent link


July 17, 2006

What I did on my summer vacation (toying with smart car keys and the Web overseas)

Spending two weeks in the Dordogne region of France with family was a retreat from the the Web and network technology. In a region famous for medieval castles, prehistoric cave paintings and canoe trips down the Dordogne River, there was nary a computer in sight. But in those rustic valleys I was introduced to one technology new to me: the "smart key" for the car.

Read more

Comments (0) | Permanent link


July 05, 2006

On vacation

Ellen Messmer is on vacation, well earned, by the way. -- The Editors.

Comments (0) | Permanent link


June 30, 2006

EMC wins RSA in secret bidding war

Storage vendor EMC won a secret bidding war to buy RSA Security for over $2 billion, with the deal expected to officially close by early next year. Some of the drama behind the deal spilled out last night as EMC and RSA executives defended the decision to combine their companies.

Read more

Comments (0) | Permanent link


June 29, 2006

OMB's get-tough policy on data security

The Office of Management & Budget, the arm of the White House responsible for overseeing the federal agencies, is adopting a get-tough attitude in the wake of well-publicized security breaches at the Dept. of Veterans Affairs, the U.S. Department of Agriculture and the Federal Trade Commission.

Read more

Comments (0) | Permanent link


June 28, 2006

RSA's chip shot

RSA Security and Broadcom Corp. yesterday said they've entered an arrangement under which Broadcom is licensing the RSA SecurID technology for integration in the Broadcom BCM5890 secure processor. The idea is once the Broadcom chip is in a device the user purchases, the user could activate the one-time password token embedded in it instead of buying a separate handheld token.

Read more

Comments (0) | Permanent link


June 27, 2006

Terrorists and the SWIFT network

What a lot of righteous indignation from the White House that the major newspapers, the New York Times, Washington Post, the Los Angeles Times and the Wall Street Journal, all had the story that the U.S. Treasury tries to identify money transfers by suspected terrorists by examining data transfered over the international banking network, SWIFT. President Bush is saying it's a "disgrace" that the media is writing about trying to track terrorists based on SWIFT exchanges.

Read more

Comments (3) | Permanent link


June 26, 2006

A man in search of rootkits

People are often drawn to search for their roots, but not too many go in search of rootkits. Mark Russinovich, co-founder of Winternals Software, has a calling to find the stealthy "rootkit" code which acts as a cloaking mechanism most would never know was there. That he happened upon the rootkit code Sony BMG had hidden to monitor its CDs for copyright purposes sparked an important national debate. In an interview with Network World, Russinovich gets to the root of rookits.

Read more

Comments (0) | Permanent link


June 23, 2006

Bad week for the feds

Just when the uproar over the massive data loss at the Dept. of Veterans Affairs is dying down a bit, two more federal agencies -- the U.S. Federal Trade Commission and the U.S. Dept. of Agriculture -- have reported bad news about data they hold being compromised.

Read more

Comments (0) | Permanent link


June 22, 2006

A token gesture?

The recent news item here about Citibank mandating use of security tokens for its small-to-midsize business customers in the U.S. drew interesting responses from readers. One comment makes the point that security tokens can be a real nuisance.

Read more

Comments (0) | Permanent link


June 21, 2006

How not to excel at Excel

Yet another hole was found in Microsoft's Excel spreadsheet yesterday, the second this week, which Microsoft says it's investigating. In the meantime, if you're worried that opening an Excel spreadsheet could let hackers take over your network, what should you do about it? Microsoft's suggestion: Don't use Excel.

Read more

Comments (0) | Permanent link


June 20, 2006

Hospitals and innovation

While healthcare providers perform wonders of medicine these days, we don't typically associate them with innovation in networking. But in our story this week "An Rx in Security," it's evident that a growing number of hospitals are actively rolling out the kind of network upgrades any enterprise would envy.

Read more

Comments (0) | Permanent link


June 19, 2006

Encryption security standards: what's new

This week's Technology Update in Network World focuses on two upcoming encryption standards for protecting data stored on tape and on disk.

Read more

Comments (0) | Permanent link


June 16, 2006

More authentic authentication

There are a lot of ways to do strong authentication in lieu of passwords that can be shared and re-used.
Slowly but surely, banks with online operations are getting authentic about strong authentication for more of their customers. Citibank is among them.

Read more

Comments (0) | Permanent link


June 15, 2006

Bruce Schneier's "Value of Privacy"

Crypto expert and curmudgeon extraordinare Bruce Schneier is at it again with the June 16th edition of his ever-engaging monthly "Crypto-gram" newsletter. This time Schneier takes on the National Security Agency and its surveillance efforts on American soil, calling it an abuse of privacy that violates basic human rights. In raising anew the privacy debate, Schneier suggests the framers of the American Constitution would find a "constant assault" on privacy to be an "alien" concept. Unfortunately, dragging the writers of the Constitution into the argument is a mistake since they were hardly paragons of privacy.

Read more

Comments (0) | Permanent link


June 14, 2006

Microsoft's Dirty Dozen

Yesterday's "Patch Tuesday"--that day of the month when Microsoft discloses the problems in its products that could cause you big headaches if you don't apply the patches--was one helluva patchfest. According to Microsoft-watchers--who make a good living cleaning up after Microsoft--the Redmond giant is breaking its own records for patches.

Read more

Comments (0) | Permanent link


June 13, 2006

Web mock-ups that say "Hack me!"

Foundstone, the divsion at McAfee which develops vulnerability-assessment products, today posted free tools to help software developers improve security at their e-commerce sites. Specifically, Foundstone has come up with Web-based mock-ups of an online bank, a bookstore, a shipping site and a desktop travel application. The goal? Experimenting with these so-called "Hacme" mock-ups--which all have some sort of vulnerability planted in them--can show developers where security problems often crop up.

Read more

Comments (0) | Permanent link


June 12, 2006

My Blue Heaven

Most are familiar with Microsoft's "blue screen of death," that yawning empty blue that appears when Windows can't recover from a system error. It's one thing to see it on an office PC, and an even more blue experience to be bluescreened in an airport as flight information vanishes into the blue.

Read more

Comments (0) | Permanent link


June 08, 2006

Hillary and the 'Net

Hillary Clinton, New York senator, former First Lady and possible presidential candidate, was talking this week about how she finds the Internet to be a dangerous place for kids. She said parents are having a hard time keeping up with the online technologies that make violent and obscene content so easily available.

Read more

Comments (1) | Permanent link


June 07, 2006

McAfee and its Preventsys buy

Yesterday McAfee said it has acquired start-up Preventsys, which makes the Preventsys Security Risk Management System for consolidatng multi-vendor data for a dashboard view of threat assessment and security compliance.

Read more

Comments (0) | Permanent link


June 06, 2006

Why trials are a trial

Financial-services firm UBS and federal prosecutors go to trial today against a former UBS employee, Roger Duronio, accused of planting a software logic bomb inside the bank's computer systems to destroy business information back in 2002. The New York Post today reports that UBS yesterday made a last-minute request to the judge to bar the public from the trial because it could cause the bank and its clients "serious embarrassment" and possibly reveal sensitive information about the UBS network and operations.

Read more

Comments (0) | Permanent link


June 05, 2006

How to be a CISO

The job of the chief information security officer (CISO) is gaining in prestige, and the corporate techie can aspire to this top security position, according to Rolf Moulton, president of professional services association ISC2. But it's not just technical certifications that count. Getting out of the geek mindset and thinking about the business is a key personality requirement for the CISO job.

Read more

Comments (0) | Permanent link


June 02, 2006

SAFE-BioPharma, and what feels safe

George Rathbun, director of IT architecture at Pfizer, recently shared his thoughts about the security measures crafted for information sharing in the biomedical industry under the collaborative effort known as "SAFE-BioPharma." Some of the ideas the biomedical companies are coming up with may have relevance for other industries, too.

Read more

Comments (0) | Permanent link