High-tech

High-tech
Light

Friday, June 27, 2014

17 obscure Windows tools and tricks too powerful to overlook

---------- Forwarded message ----------
From: "Network World Daily News PM Alert" <nww_newsletters@newsletters.networkworld.com>
Date: Jun 26, 2014 2:09 PM
Subject: 17 obscure Windows tools and tricks too powerful to overlook
To: <aquarianm@gmail.com>
Cc:

Cool Stuff at CE Week New York

No more excuses, time to roll out IPv6, says registry boss

Network World Daily News PM
June 26, 2014
Share this email

17 obscure Windows tools and tricks too powerful to overlook

Peering deep inside WindowsThe beauty of Windows lies in its flexibility and depth. In fact, Windows is so deep and flexible that many of us never touch its more powerful tools, whether from unawareness or sheer forgetfulness. But beneath Internet Explorer and the Start button hides a universe of tools and tricks that are positively brimming with potential.To read this article in full or to leave a comment, please click here

READ MORE
 

Issue highlights

1. Cool Stuff at CE Week New York

2. No more excuses, time to roll out IPv6, says registry boss

3. IPv6 usage is climbing in Europe, while Asian countries are most ready for 4K TV, says study

4. Cyphort provides guidance on prioritizing APTs for mitigation

5. 8 Internet things that are not IoT

6. SCOTUS: 'Privacy comes at a cost' but 'get a warrant' before searching that phone

7. Carnegie Mellon system lets you get to the good parts of video, fast

8. VMware catches up with some Apache Struts patches, but not all

9. Hackers found controlling malware and botnets from the cloud

10. Supreme Court goes 1 for 2 on big tech decisions

WHITE PAPER: Limelight Networks

Step-by Step Guide to Optimizing the Digital Experience

This practical guide to superior online performance takes a closer look at the complex concept of online performance: what it is, how to measure it, and—most critically—what it takes to make it better. Learn More

Cool Stuff at CE Week New York

OK, kids, strap in for this post - we're going to move quickly here. Start off by watching the video above to see a bunch of new gadgets that we saw this week at the CE Week New York event (in New York City, natch).There was pretty much something for everyone - new health and fitness gadgets, toys and robots for the kids, audio gear, new 4K TVs, and a bunch of stuff for your smartphone or tablet or computer.Ready, set go!Elektrokidz: From WowWee Robotics comes these cute creatures - don't call them Trolls (the Trolls people might get irked) - but rather these toys react to the beat of music in fun ways. WowWee was showing these at the show alongside their new MiP robots (we saw them at CES), which explore, dance, play games and do other activities by balancing on their two wheels.To read this article in full or to leave a comment, please click here READ MORE

No more excuses, time to roll out IPv6, says registry boss

As the dwindling number of IPv4 addresses starts to cause problems for organizations around the world, time has come to roll out IPv6 on a larger scale and leave behind dead-end technologies that delay the inevitable, according to the chief of the regional Internet registry in Asia-Pacific.The newer version of the IP (Internet Protocol) adds an almost inexhaustible number of addresses thanks to a 128-bit long address field, compared to the 32 bits used by version 4. Since every connected device on the Internet needs an IP address, there is increasing pressure to move to IPv6 as more non-computer devices come online in the so-called Internet of things.To read this article in full or to leave a comment, please click here READ MORE

IPv6 usage is climbing in Europe, while Asian countries are most ready for 4K TV, says study

Belgium is leading the world in IPv6 adoption, while South Korea and Japan are most ready for 4K video streaming, according to a report.That Japan and South Korea should be preparing for the arrival of 4K video is no surprise, given that they are home to some of the world's largest TV and flat-panel display makers.But Belgium, a leader in the use of the new addressing system that potentially allows every person and device on the planet to have their own unique IP address? Yes, says Akamai Technologies in its State of the Internet report for the first quarter of 2014.The report, a grab-bag of statistics about Internet traffic volumes and technology adoption, is based on traffic passing through the company's global content delivery network (CDN).To read this article in full or to leave a comment, please click here READ MORE

: LogMeIn

Avoid the Sales/IT Collision Scenario

This InfoWorld research report, based on an IDG QuickPulse survey administered to IT professionals, will provide insight into the BYOA trend, identify pain points associated with traditional online meeting tools, and address business-driven IT requirements that benefit the overall organization. Read Now

Cyphort provides guidance on prioritizing APTs for mitigation

This column is available in a weekly newsletter called IT Best Practices.  Click here to subscribe.  It seems the life tech generation cycles is getting shorter these days. It has only been a few years since the emergence of a class of sophisticated solutions that detect and prevent advanced persistent threats (APT) in the enterprise by monitoring URLs and content and forcing them to play out in a sandbox to look for the presence of malware. Fed by the analysis of billions of transactions across the Internet, these solutions can pinpoint malicious behaviors, IP address and URLs and provide intelligence to firewalls, proxies and intrusion prevention systems (IPS) to make them more effective.To read this article in full or to leave a comment, please click here READ MORE

8 Internet things that are not IoT

Cisco's proclamations on the value of the Internet of Things/Everything market -- $14.4 trillion -- would seem to include everything but the kitchen sink… and maybe even that if it's IP-enabled. So is there anything IP-enabled that's not included in the Internet of Things/Everything market? We asked a couple of analysts tracking the market and they gave us a list of eight IP-enabled devices they do not consider elements of the Internet of Things/Everything:To read this article in full or to leave a comment, please click here READ MORE

SCOTUS: 'Privacy comes at a cost' but 'get a warrant' before searching that phone

In huge win for digital privacy that will help pave the future of the Fourth Amendment, the Supreme Court unanimously ruled that Johnny Law needs a warrant before he can search the cellphone a person he arrested.Despite a former DHS official's previous opinion that reduced the Supreme Court Justices to "nine Baby Boomers" who wouldn't know the "creepy line" if it bit them on the butt, yesterday SCOTUS showed that people are still entitled to Fourth Amendment protections even in the digital age. "Our answer to the question of what police must do before searching a cell phone seized incident to an arrest is accordingly simple—get a warrant," they ruled (pdf).To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Damballa

Fortune 500 Company Deploys Damballa Failsafe

A Fortune 500 company wanted to detect advanced malware, zero-day threats, and other targeted attacks. Every solution they reviewed used signature-based techniques or sandboxing, which wasn't enough. They selected Damballa Failsafe to plug the security gaps. Read Now

Carnegie Mellon system lets you get to the good parts of video, fast

While Video has become ubiquitous thanks mostly to smartphones it doesn't mean you want to actually watch all of it. Carnegie Mellon University computer scientists say they have invented a video highlighting technique called LiveLight that can automatically pick out action in videos shot by smartphones, GoPro cameras or Google Glass users. +More on Network World: NASA's coolest 'way-out' future projects+ LiveLight constantly evaluates action in a video, looking for visual novelty and ignoring repetitive or eventless sequences, to create a summary that enables a viewer to get the gist of what happened. What it produces is a miniature video trailer. Although not yet comparable to a professionally edited video, it can help people quickly review a long video of an event, a security camera feed, or video from a police cruiser's windshield camera, according to Carnegie researchers.To read this article in full or to leave a comment, please click here READ MORE

VMware catches up with some Apache Struts patches, but not all

Two months after critical vulnerabilities were patched in Apache Struts, a popular open-source framework for developing Java-based Web applications, VMware released a security update to incorporate the fixes in its vCenter Operations Management Suite product but appears to have left out a more recent patch.The vCenter Operations Management Suite can be used to monitor and manage the performance, capacity and configuration of virtualized infrastructure. It depends on Struts for some of its features."The Apache Struts library is updated to version 2.3.16.2 to address multiple security issues," VMware said in a security advisory Tuesday that coincided with the release of vCenter Operations Management Suite (vCOps) version 5.8.2.To read this article in full or to leave a comment, please click here READ MORE

Hackers found controlling malware and botnets from the cloud

In what is considered to be a natural evolution of tactics used by cybercriminals to infiltrate corporate networks, security firm Trend Micro has new evidence that more botnets and malware are being not only hosted in the cloud, but controlled remotely from cloud servers.The goal of hackers is to disguise their malicious software as regular traffic between corporate end points and cloud-based services.Trend Micro reported today through a blog post that it has observed the first instance of hackers using DropBox to host the command and control instructions for malware and botnets that have made it past corporate firewalls."At end of the day, cybercriminals are business people," says Trans Micro Global Threat Communications Manager Christopher Budd. "The same logic that drives business people to using cloud-based services is driving the bad guys to use the cloud too." And that requires business end users to stay on their feet to combat these threats.To read this article in full or to leave a comment, please click here READ MORE

Supreme Court goes 1 for 2 on big tech decisions

Wednesday was a big day for technology cases in the Supreme Court. The Justices ruled on a pair of important cases that promise to have wide-ranging implications for the development and use of modern technology for years and decades to come. But the effects of the decisions aren't necessarily what either side in the cases has been arguing.One decision rightly affirmed that cellphones cannot be searched by police without a warrant. The other rejected Aerio's claim that its unique technological model circumvented copyright restrictions, without addressing the larger cloud storage issues everyone is worrying about. Let's look at the cellphone case first.To read this article in full or to leave a comment, please click here READ MORE

WHITE PAPER: Radware

ITaaS and Virtual Application Delivery Infrastructure

Cost reduction, business agility and operational efficiency: three main drivers for any CIO considering the adoption of cloud computing and virtualization technologies as part of an IT-as-a-service initiative. Learn More

SLIDESHOWS

5 potential Facebook killers

Outside of the obvious suspects – LinkedIn, Twitter and Google+ – who has the potential to unseat Facebook? Here are five possibilities.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. 17 obscure Windows tools and tricks too powerful to overlook

2. First Look: Google's I/O announcements

3. Google trumps Microsoft's 1TB of storage with unlimited space

4. 100Mb/sec Ethernet coming to a car near you?

5. Early user of VMware NSX net virtualization tool

6. Gartner: Best practices for Amazon AWS security

7. Hungry ants knock out FiOS service … again

8. New iOS jailbreak could become sinister

9. Why One CIO Is Saying 'No' to BYOD

10. HP doubles enterprise switch capacity; calls revamped 5400R a Cisco Catalyst 4500 'killer'

Follow Network World

Share this email

You are currently subscribed to networkworld_daily_news_alert as aquarianm@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

Learn about INSIDER

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com

Copyright (C) 2014 Network World, 492 Old Connecticut Path, Framingham, MA 01701

** Please do not reply to this message. To contact someone directly, send an e-mail to customer_service@nww.com. **

No comments:

Post a Comment