Plugging the holes in porous university networks: "Not only are student laptops outside the control of the university's IT department, but students also tend to be drawn to software and services that pose security risks. In particular, students make great use of instant messaging systems and peer-to-peer systems, which are increasingly the target of security attacks, and students also tend to be drawn to free software, such as Kazaa, which is frequently targeted by Trojans and other computer infections. Plus, students tend to connect mobile devices, which are themselves increasingly the target of attacks."—IT-Director.com
Monday, January 24, 2005
About Me
- Name: Charlie
- Location: Austin, Texas, United States
Hi, I'm Charlie Wood. I'm the founder and former CEO of Spanning (acquired by EMC), a married father of two, a native Texan and Austinite, and the oldest guy in most of my classes at UT, where I'm adding an economics major to my computer science degree.
For more about my re-entry into academic life, read this blog's inaugural post.
Subscribe
Previous Posts
- MS AntiSpyware bites BitDefender: "A trial version...
- SonicWALL Debuts World's First Sub-$400 Gateway An...
- Brian Hook on the ActiveX Experience: "Brian Hook ...
- AlterPoint Addresses Compliance, Security: "To kee...
- Fried By Spyware: "How much of a nuisance is the p...
- Nokia to launch all-in-one enterprise VPN solution...
- Check Point Unveils Connectra 2.0, Introduces Indu...
- Symantec's Schwarz on Microsoft's Antispyware: "Th...
- Trojan Exploits Windows DRM Loophole: "Remember ju...
- Securing data from the threat within: "Firewalls a...
<< Home