Much of research and development efforts these days focuses on finding security holes and plugging them. The poster child of these efforts is Microsoft – which just last week issued 14 security patches – but the truth is that all network and computer software is being re-examined, including protocols like TCP and software from Cisco (see stories below). This week we also look at the coding process itself, and how fundamental change is needed to ensure that code is more secure when it first hits the ‘Net. Security holes force firms to rethink coding processes http://www.nwfusion.com/news/2004/0419codereview.html?netMuch of research and development efforts these days focuses on finding security holes and plugging them. The poster child of these efforts is Microsoft – which just last week issued 14 security patches – but the truth is that all network and computer software is being re-examined, including protocols like TCP and software from Cisco (see stories below). This week we also look at the coding process itself, and how fundamental change is needed to ensure that code is more secure when it first hits the ‘Net.Security holes force firms to rethink coding processeshttps://www.nwfusion.com/news/2004/0419codereview.html?net Experts warn of TCP vulnerabilityFor almost two decades researchers have known that a bug – er, feature – in TCP could be exploited by someone for a denial-of-service attack against core Internet routers. But with more broadband Internet connections in use today, that possibility is greater than ever, prompting some to sound the alarm yesterday. https://www.nwfusion.com/news/2004/0420experwarn.html?netCisco warns of hijack code for VPN gearCisco last week warned that hacker software now exists that allows attackers to break into a Cisco-based VPN by intercepting VPN logon/password data.https://www.nwfusion.com/news/2004/0420ciswarn.html?netMCI emerges from bankruptcy protectionMCI Tuesday said it has formally emerged from Chapter 11 bankruptcy protection and is beginning to distribute securities and cash to its creditors. https://www.nwfusion.com/news/2004/0420mciemerg.html?netToday on Layer 8, Quelle gaspillage des resources du Rézo:Microsoft Office Gangsta Edition 2004; Brits find security sweet; the 25 worst words of 2004; and the Ugly American Phrasebook for Travelers (which will explain the French above); all this and more today at your home for not-just-networking news.https://www.nwfusion.com/weblogs/layer8/?net Related content news End of road for VMware’s end-user computing and security units: Broadcom Broadcom is refocusing VMWare on creating private and hybrid cloud environments for large enterprises and divesting its non-core assets. By Sam Reynolds Dec 08, 2023 3 mins Mergers and Acquisitions Industry news analysis IBM cloud service aims to deliver secure, multicloud connectivity IBM Hybrid Cloud Mesh is a multicloud networking service that includes IT discovery, security, monitoring and traffic-engineering capabilities. By Michael Cooney Dec 07, 2023 3 mins Network Security Cloud Computing Networking news Gartner: Just 12% of IT infrastructure pros outpace CIO expectations Budget constraints, security concerns, and lack of talent can hamstring infrastructure and operations (I&O) professionals. By Denise Dubie Dec 07, 2023 4 mins Network Security Data Center Industry feature Data centers unprepared for new European energy efficiency regulations Regulatory pressure is driving IT teams to invest in more efficient servers and storage and improve their data-center reporting capabilities. By Maria Korolov Dec 07, 2023 7 mins Enterprise Storage Green IT Servers Podcasts Videos Resources Events NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe