Newsletter Archives

Network Architects Looking To Experience Growth in 2010
The current economic climate is in an odd place right now. Early in 2009, we were in a state of shock and for some, despair.

Date: 2009-12-29

Discover the Rackspace Product Roadmap
Explore some of the most effective IT solutions available to businesses today, and let us show you how to leverage them in the coming year.

Date: 2009-12-16

Miko Matsumura Discusses Succeeding With The Cloud
Many people have written that cloud computing will become pervasive in the enterprise and I certainly agree.

Date: 2009-12-14

The Future Of Networking Will Be In The Clouds
If you're wondering about future trends in computing, you need to be aware of Google's Chrome OS. If you've ever heard of the concept of the Web as an operating system, this is basically Google's attempt at delivering on that. 

Date: 2009-11-30

Red Ventures Banking On Verizon Business Network
Red Ventures is an internet marketing business which is responsible for multi-channel and massive acquisition programs. They represent many of the leading businesses in the US, Canada, and Puerto Rico. 

Date: 2009-11-16

Kiss your antivirus bloatware goodbye
How does your current software compare? VIPRE Enterprise scans at a brisk 13.95 MB/sec and uses just 27% of CPU and 50 MB of RAM. In idle, it uses a mere 13.3 MB RAM with a disk footprint of just 113 MB. You'll hardly notice it's running!

Date: 2009-11-12

New Plans For MySQL Revealed By Oracle
Oracle updated its frequently asked questions (FAQ) overview of the impending Sun acquisition to address some important questions about the fate of Sun's software assets beyond Java and Solaris.. 

Date: 2009-11-02

Report Identifies Vulnerabilities In NASA's Networks
Another reminder to stay on top of network security has come courtesy of NASA.  Yes, the organization responsible for sending the first man to the moon and multiple robot probes elsewhere in the galaxy is not doing the best job of keeping its networks off-limits to unauthorized parties. 

Date: 2009-10-19

The best value in Network Management - Free Download
The best value in Network Management - OpManager is the network monitoring software of choice of over 700000 Network administrators across 93 countries.

Date: 2009-10-14

Building The Fact Of Network Cloud Computing
I have found that with cloud computing there seems to be a ton of "expert" advice but it is not coming from people who are actually building solutions in the cloud.

Date: 2009-10-12

How To Troubleshoot Wireless Network Issues On Aspire One
My Acer Aspire One - powered by a commercial Linux distro called Linpus - after entering sleep mode couldn't connect to the wireless network anymore. 

Date: 2009-09-29

Hitachi, Netcordia Help With Network Management
Aside from all of the obvious exterior stuff - spoilers, wide wheels, dual or quad exhausts - high performance cars tend to have more gauges than the average Honda. 

Date: 2009-09-15

Iomega Announces Four-Drive Network Storage Appliance
Individuals and small businesses needing to store and share a whole lot of data may want to take a look at Iomega's newest offering. 

Date: 2009-08-31

Network Problem? Solve it even before the app team knows about it!
It's a challenge ensuring applications run smoothly over today's distributed enterprise networks. Multiple IT teams troubleshoot user complaints, with none having the complete visibility needed to solve the problem.

Date: 2009-08-25

How To Run An Open Soruce GSM Network
Slashdot reports that Harald Welte is operating an open source GSM network at the Hacking at Random (HAR) conference.

Date: 2009-08-17

DefCon Presenter Uses Networks To Unlock Doors
Network users and managers have, unfortunately, been given yet another reason to be nervous.  On the final day of last week's DefCon Hacking Conference, one man demonstrated a novel and rather intimidating way of gaining access to a place.

Date: 2009-08-03

Your search for network monitoring software ends with OpManager
It's a challenge ensuring applications run smoothly over today's distributed enterprise networks. Multiple IT teams troubleshoot user complaints, with none having the complete visibility needed to solve the problem.

Date: 2009-07-28

Making Your Network More Secure With Better Password Tactics
Since last week we saw the publishing of confidential documents from inside Twitter (I doubt any of you missed that, but if you did, TechCrunch last week got passed documents from a hacker who figured out how to get into several accounts at Twitter).

Date: 2009-07-20

Avoiding Network Security Mistakes
Networks are complicated beasts, and any numbers of things can go wrong.  It's best not to let other people "help" accidents occur, though, and so network managers may find a list of common security-related mistakes useful.

Date: 2009-07-06

Your search for network monitoring software ends with OpManager
38 MB | Completely web-based | Agent-less Monitoring | In-built database & web server | Multi-OS support | Multi-vendor support | Device Templates | Interface Templates | Bulk Configuration Views | Quick Configuration Wizard | Processes Monitoring Templates

Date: 2009-06-30

Changing The Network Name On Your iMac
I just bought a used iMac and am frustrated to find that it identifies itself as "Susie's Q" on the network. Since I'm not Susie - and never have been! - I really want to change this. How do I change my iMac's name in Mac OS X on the network?

Date: 2009-06-29

Access Your Online Network By Tethering Your iPhone
I've just come across a link that describes how to enable tethering on the iPhone 3G using the 3.0 software update that was released yesterday.

Date: 2009-06-18

Business Efficiency Tips from Rackspace
When your company depends on its website and/or applications to be online all the time, Rackspace® has the technology, services, technical expertise and customer support to make uptime a reality—not wishful thinking.

Date: 2009-06-17

Social Networking Challenge To Network Security
The increase in social networking and mobility trends is presenting challenges to companies' network security, disaster planning and business continuity, according to a new study from AT&T.

Date: 2009-06-01

Older Hacking Methods Still Used To Capture Forums
If you are running a Simple Machines Forum, there is a new hack making the rounds, and it is enough to turn your forum into something you no longer control. The hack first showed up May 01 2009, and has been gaining steam over the last couple of days. If you run the software, make sure you follow the cleaning instructions.

Date: 2009-05-18

Why Is GPL Selected By Open Source Vendors?
I started to consider the reasons why open source vendors select the GPL after ESR wrote: "The GPL may be a community-building signaling device, but it is also a confession of fear and weakness. To believe that it matters, you have to believe that you live in a Type A universe where closed-source development is such an attractive proposition that you have to punish people for trying to move to it."

Date: 2009-05-04

P2P Is About Instant Gratification Not Thievery
'P2P is a demand signal from the market,' says Cory Doctorow. If that's the case, what are we to make of The Pirate Bay conviction last week? For those who don't know, Pirate Bay is one of the world's largest Bittorrent search engines. It allows people to search through the gazillions of TV shows, films and other entertainment that sit on the web.

Date: 2009-04-20

Tips To Help With Your Cloud Computing Project
Just finishing up the final touches on my first big cloud computing project, and there was much to learn here, some pitfalls and some promises in the cloud that might help you with your cloud computing project.

Date: 2009-04-06

Hacking WordPress Through Security Flaws
Bandit Defense has posted a new Wordpress hack, but there are some things you need to know about first. The biggest one is that it relies on poor security at the hosting company, and already knowing the password to the Wordpress website you want to hack.

Date: 2009-03-23

Bypassing Internet Communication Restrictions
Steve Hodson from Win Extra quite rightly asks what we can do in the face of restrictive or repressive internet social media. The good thing is that this is an easy question to answer, because humans have been working their way around authority since we began. Not everyone is a fan of authority, and the internet makes it very easy to bypass internet restrictions.

Date: 2009-03-09

Introducing Rackspace Cloud Hosting
Minimize your expenses for hosting your sites, applications, files and email. Pay only for what you use. Grow as you need to without worrying about managing hardware. And do it for a lot less than what you are doing right now.

Date: 2009-02-25

Securing Your Site With Google Advice
Hacking is a major problem that is increasing day by day. The Internet world is flocked with hundreds of, infact of thousands of anti hacking software but their effectiveness is still in question! In a recent post at Google's Webmaster Central blog, Search Quality Team of Google talks about two most common attacks resulting in hijacked websites: SQL injection and cross-site scripting (XSS).

Date: 2009-02-23

Dolphin Stadium Hacked For Super Bowl
In what is becoming far too normal, the Dolphin Stadium Web Site was hacked for a few hours and was delivering malware to people who visited it. The American Football League is looking for information on the hacker that broke into the Dolphin Stadium Web site and hacked it so that it would deliver malware to the millions of people who will be visitng the web site on Feburary 1st, 2009..

Date: 2009-02-10

Email relief from Mailtrust, the leader in email hosting
Our mission is to make you love your email again by relieving the burden of expensive equipment, upgrades, software, energy costs, and staff required to maintain professional grade business email. Join the over 1 million mailboxes discovering Email Relief with Mailtrust. Start now with free setup and no upfront fees.

Date: 2009-02-04

Monster Gets A Monster Of A Hack Again
Monster has been been hacked again, along with (which monster runs), this time with a loss of information for people who are seeking jobs. Be careful which job opportunities you respond to, and change your password.

Date: 2009-01-26

Recession-Proof Email with Mailtrust
Succeed in challenging times with the right processes, tools, and technology. For nearly a decade, Mailtrust has provided thousands of businesses just like you with cost-effective email hosting solutions.

Date: 2009-01-14

Learning Hacks The Chinese Hackers Use
You might be surprised by how mundane this list is, most security engineers should have them in their toolboxes as well. A few here are new to me, and worth sharing. The Dark visitor has a list of common tools that Chinese hackers are using, the good part is that if you find any of these on your network, and they are not yours you might have an idea of where they came from.

Date: 2009-01-12

2008 Archive
2007 Archive
2006 Archive
2005 Archive

Send me relevant info on
products and services.