CARVIEW |
Select Language
HTTP/2 302
server: nginx
date: Sun, 03 Aug 2025 20:16:53 GMT
content-type: text/plain; charset=utf-8
content-length: 0
x-archive-redirect-reason: found capture at 20090408071333
location: https://web.archive.org/web/20090408071333/https://www.infoworld.com/d/security-central
server-timing: captures_list;dur=0.636937, exclusion.robots;dur=0.023161, exclusion.robots.policy;dur=0.010828, esindex;dur=0.014756, cdx.remote;dur=2382.610732, LoadShardBlock;dur=240.283947, PetaboxLoader3.datanode;dur=118.193083, PetaboxLoader3.resolve;dur=84.922689
x-app-server: wwwb-app212
x-ts: 302
x-tr: 2660
server-timing: TR;dur=0,Tw;dur=0,Tc;dur=0
set-cookie: wb-p-SERVER=wwwb-app212; path=/
x-location: All
x-rl: 0
x-na: 0
x-page-cache: MISS
server-timing: MISS
x-nid: DigitalOcean
referrer-policy: no-referrer-when-downgrade
permissions-policy: interest-cohort=()
HTTP/2 200
server: nginx
date: Sun, 03 Aug 2025 20:16:54 GMT
content-type: text/html; charset=UTF-8
x-archive-orig-date: Wed, 08 Apr 2009 07:13:33 GMT
x-archive-orig-server: Apache/2.2.3 (CentOS)
x-archive-orig-x-powered-by: PHP/5.2.8
x-archive-orig-expires: Sun, 19 Nov 1978 05:00:00 GMT
x-archive-orig-last-modified: Wed, 08 Apr 2009 07:13:33 GMT
x-archive-orig-cache-control: store, no-cache, must-revalidate
x-archive-orig-cache-control: post-check=0, pre-check=0
x-archive-orig-connection: close
x-archive-guessed-content-type: text/html
x-archive-guessed-charset: utf-8
memento-datetime: Wed, 08 Apr 2009 07:13:33 GMT
link: ; rel="original", ; rel="timemap"; type="application/link-format", ; rel="timegate", ; rel="first memento"; datetime="Sun, 05 Apr 2009 21:34:29 GMT", ; rel="prev memento"; datetime="Sun, 05 Apr 2009 21:34:29 GMT", ; rel="memento"; datetime="Wed, 08 Apr 2009 07:13:33 GMT", ; rel="next memento"; datetime="Mon, 13 Apr 2009 19:02:11 GMT", ; rel="last memento"; datetime="Fri, 10 May 2024 11:25:07 GMT"
content-security-policy: default-src 'self' 'unsafe-eval' 'unsafe-inline' data: blob: archive.org web.archive.org web-static.archive.org wayback-api.archive.org athena.archive.org analytics.archive.org pragma.archivelab.org wwwb-events.archive.org
x-archive-src: 51_9_20090408070523_crawl102-c/51_9_20090408071308_crawl103.arc.gz
server-timing: captures_list;dur=0.550654, exclusion.robots;dur=0.018547, exclusion.robots.policy;dur=0.010081, esindex;dur=0.011548, cdx.remote;dur=259.940940, LoadShardBlock;dur=183.786027, PetaboxLoader3.datanode;dur=137.212372, PetaboxLoader3.resolve;dur=134.821255, load_resource;dur=173.400364
x-app-server: wwwb-app212
x-ts: 200
x-tr: 697
server-timing: TR;dur=0,Tw;dur=0,Tc;dur=0
x-location: All
x-rl: 0
x-na: 0
x-page-cache: MISS
server-timing: MISS
x-nid: DigitalOcean
referrer-policy: no-referrer-when-downgrade
permissions-policy: interest-cohort=()
content-encoding: gzip
Security Central - InfoWorld
essential information on Security Central
Security Central discussion topics

- Feature
Test Center guide to browser security
Chrome, Firefox, Internet Explorer, Opera, and Safari have different security advantages and shortcomings. More important than the browser you choose, however, is how you maintain and use it. more
- Virtual Conferences
- Virtual Directions
- IT Innovations Forum
Trend Micro expands SaaS security strategy
Cloud-based service can be used in lieu for Trend's antimalware package
Bill seeks to give president power over private networks
Provision that enables the White House to shut down critical infrastructure networks for security reasons may be a hard sell
Conficker copycat prowls for victims, says Microsoft
Four-year-old Neeris worm copies Conficker's attack strategies
IBM sees Conficker hitting 4 percent of PCs
Experts had pegged Conficker infections in the 2 million to 4 million range, but IBM's numbers suggest that they may be in the tens of millions
Hackers seize on zero-day flaw in Microsoft's PowerPoint
Independent security company Secunia has rated the PowerPoint vulnerability 'extremely critical,' its highest-risk ranking

Blog entry
Good security in recessionary times
A rough economy can be a good opportunity for your company to pay attention to the basics of IT security. Getting the essentials... more
White Paper
Configuration Assessment: Choosing the...
Configuration assessment lets businesses proactively secure their IT infrastructure and achieve compliance with important... more
Blog entry
Let your worst fears be your guide
Your computer security defense should be built with the assumption that all attackers are trusted, highly privileged insiders... more



Robert X. Cringely
/ A Wolverine in Fox's clothing
04-06-09

whurley
/ Does the cloud really need a manifesto?
04-06-09

Tom Yager
/ Rich online apps can learn from the old IBM 3270 terminal
04-01-09

SECURITY ADVISER
Are you ready for the big one?Blog by Roger A. Grimes
In the age of the Internet, good security means never taking availability for granted- The Tripwire HIPAA Solution: Meeting the Security Standards Set Forth in Section 164 | White Paper →
- Configuration Assessment: Choosing the Right Solution | White Paper →
- Beyond PCI Checklists: Securing Cardholder Data with Tripwire’s Enhanced File Integrity Monitoring | White Paper →
- Addressing Compliance Initiatives with Tripwire and the Center for Internet Security | White Paper →
- File Integrity Monitoring: Secure Your Virtual and Physical IT Environments | White Paper →



Sign up to receive Infoworld Resource Alerts
Subscribe to the Security Central Newsletter
The one-stop resource center for IT professionals.

64-page prescriptive guide to security, compliance, and IT operations.Zenith ARCA - The All-in-One Business Continuity ApplianceSmart. It’s The New Speed. Introducing The New Intel® Xeon® Processor 5500 Series. FREE Data Leakage for Dummies Book from Sophos. Request a book today!From Data Center to Desktop, Microsoft Virtualization delivers

Antispyware Software
High performance Antispyware software from Sunbelt Software |
The IDG Network
©1994-2009 Infoworld, Inc.