Home News Insight Builder Reviews Jobs Downloads newsletters
Insight:   Hardware  |  Software  |  Security  |  Communications  |  Business  |  Commentary  |  Archive
Advertisement

Battle of the bots

Battle of the botsYou can't hear them and you can't see them, but be warned, bots are all around us and they do have a search-and-destroy attitude that could be the death of your business.
Related Stories
 Run! The bots are coming
 Google's fraud squad battles phantom clicks
Buying secrets on eBay
Microsoft out-Firefoxed?
Replace Telnet with SSH for better security
Cisco on security: It's a network thing
Symantec gets ready to take on Microsoft
Making your IM secure -- and deniable
Microsoft casts a spyware net
The state of security: It ain't pretty
 More stories

Security Highlights

Is a digital doomsday around the corner?
With hackers developing new methods of targeting us as quickly as we come up with defences, just how fragile is our wired economy?

Ten security laws you can rely on
Microsoft's Security Response Center gets many thousands of calls for help with security problems. Here are the top ten laws, gleaned from those calls, that you can guarantee will crop up time and time again.

Is hard time for worm author too harsh?
Teenager sentenced to 18 months for writing a MSBlast worm got his just deserts, according to a Web poll. What's your take?

Fix major Microsoft Office flaws
A Chinese academic has revealed a major problem with the way Microsoft's encryption tool handles Word and Excel files. This flaw could allow a cracker with basic cryptography skills to decrypt the files.

Crisis strikes: What do you do next?
The corporate Web site is gone and a hacker has made off with the database. The company's reputation is at stake. What crisis management tactics should be employed?

How to create a password policy
Passwords are key to network security, so it's essential to have a strong policy in place to ensure they are kept secure. We give you some pointers as to how this can be done.

Detect intruders in Microsoft IIS
It is not necessary to spend thousands of dollars on intrusion detection for Microsoft's IIS Web servers. Attacks to these public servers typically focus on only a small handful of programs. We show you what to look for.

Should security researchers keep mum?
By making coding flaws public, are security researchers exposing users to unnecessary risk? Some believe only full disclosure keeps vendors honest. Flaw finders, however, disagree.

Is MS AntiSpyware worth your time?
The anti-spyware software recently announced by Microsoft is now mature enough to evaluate but is it a godsend?

Preparing for a doomsday attack
Things could get rough if bad guys blend physical and virtual attacks, says VeriSign CEO Stratton Sclavos.

Microsoft's alpha tester
If anyone has a right to complain about buggy Microsoft products, it's Ron Markezich, the software maker's chief information officer. In this interview, he tackles several issues including the company's no Linux policy.

Pest control: Battling spyware
To help curb the torrent of spyware, ZDNet Australia presents a spyware superguide comprising the latest reviews, tips and tricks aimed at keeping users safe.

Tech execs: Wake up and smell the spam
It is vital that the tech industry raises awareness of the scale of the problem of junk e-mail, industry experts said.

False promises about ending spam
CNET News.com's Charles Cooper asks whether the tech industry is only kidding itself about what it will take to fight the plague.

How to attack spammers in your sleep
Plans are afoot to attack spammers by launching the kind of cyber-attack favoured by organised crime and hackers with an axe to grind.

Call to arms against cybercrooks
The CTO of betting exchange Betfair says that more cross-industry cooperation is needed to prevent denial-of-service attacks against online businesses.

Must read
Working for a telco? Beware of burnout
A new survey reports that the telecommunications industry is the worst in the country for employee burnout.
Don't miss
Think you can do Tropfest?
Simply tell us your short film idea and you could receive a SONY DCRHC100 Handycam ($3299) and a SONY DRU710UL ($329) external DVD burner.
Fran Foo
Online banking theft -- who pays?
Advertisement
Register for exclusive content and special offers.
CIOs shift focus to IT services in 2005: Gartner
Intel's multi-core love affair
Hotmail outage peeves some e-mail users
Hackers on Medicare smart card waiting list
Wireless
Process Improvement
Servers
E-mail
CRM
Weekly Insight
IT in Government
Enterprise Storage


 Sponsored Links
FBI Security Training:   Hands-On Lab with the woman who trains the FBI. Limited places!
Your invitation:   Attend the IBM Integrate & Manage Forum in March 2005. Click Here
Network Bottleneck?   You can fix it in 30 minutes with TaskQoS-YJE! FREE trial
Virgin Credit Card:   Voted cheapest credit card 2005 by Money Magazine.
 Featured Links
Tropfest Giveaway  Win a Sony MiniDV Handycam and DVD burner
Ditching Outlook  We take a look at the viable alternatives to Outlook
Tech DIY  Tips and tricks to set up your ultimate home office.
Pocket Rockets  Here's five MP3 capable mobiles that will have you bopping along.
Home News Insight Builder Reviews Jobs Downloads Newsletters
CNET Networks AU: Builder AU | Technology & Business | CNET.com.au: Home Entertainment, Home Office, On the Move, Music
Security & Privacy Policy | Terms of Use | Advertise | Contact | About Us | Site Map
Copyright © 2005 CNET Networks, Inc. All rights reserved. ZDNet is a registered service mark of CNET Networks, Inc. ZDNet Logo is service mark of CNET Networks, Inc.