Monday, August 29, 2005

Word of the Day: greynet

WhatIs.com: Word of the Day
August 30, 2005
___________________________________

ISSUE SPONSORED BY: SearchTechTarget: A treasure site of IT knowledge

......................................................................
IN THIS ISSUE

-- Word of the Day: greynet
-- Today's Tech News
-- Brain Food
-- Additions and Updates

::::::::::::::::::::::::::::: SPONSOR :::::::::::::::::::::::::::::::

SearchTechTarget: A treasure site of IT knowledge

Whatis.com is just one of 25 TechTarget Web sites that can give you
instant power and search results about your latest IT question.
Imagine a great wealth of knowledge and experience in the form of
fast search, hot topics, the latest news, ITKnowledge Exchange,
Webcasts and white papers spilling out of a single well-organized
site. Take a minute and explore the power of the portfolio behind
Whatis.com.
http://searchtechtarget.techtarget.com/?track=NL-34&ad=526847

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

TODAY'S WORD: greynet

Greynet is a term for the use of unauthorized applications on a
corporate network. A greynet application is a network-based program
that corporate network users download and install without permission
from their company's IT department. Common examples of greynet
applications include instant messaging, peer-to-peer collaboration
and conferencing programs, streaming media players, and RSS readers.

Many greynet applications, such as instant messaging and
collaboration programs, have legitimate business use and help boost
user productivity. Other greynet applications, like peer-to-peer file
and music sharing programs, pose serious security risks and can drain
network resources. User-downloaded programs also can include
malicious programs like spyware components for tracking and reporting
information without the user's knowledge. Greynet usage by employees
is thought to be a major contributor to the growth of spyware-related
incidents.

All greynets, even those that benefit the end-user, can be
detrimental to a company network. Because they use corporate
bandwidth, the programs often have negative effects on overall
network performance. They introduce security risks, including client
code vulnerabilities and new avenues for attack, and can lead to data
loss and property or identity theft. Greynets can be difficult to
eliminate because many use encryption and port agility (the ability
to dynamically send and receive traffic across any open network
port), which makes them difficult to detect and block.

SEE OUR COMPLETE DEFINITION, WITH HYPERLINKS:
http://searchsecurity.techtarget.com/sDefinition/0,290660,sid14_gci1120247,00.html?track=NL-34&ad=526847

RELATED CONTENT:

SpywareGuide.com includes articles about spyware and greynets.
http://www.spywareguide.com/index.php

The article "Spyware skyrockets on greynet fuel" offers statistics on
greynets in the enterprise.
http://www.internetnews.com/stats/article.php/3524541

TODAY'S TECH NEWS
......................................................................

ANTIVIRUS CAN INTRODUCE DANGEROUS NETWORK SECURITY HOLES INTO ANY OS
| SearchSecurity.com
AV software is one of the most basic security steps available. It's
also yet another gateway for security breaches.
http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci1118312,00.html?track=NL-34&ad=526847

MICROSOFT TAKES STEPS TO EMBED PRESENCE | SearchWin2000.com
Developers have a new tool to build presence awareness into
applications. What IT chooses to do with that capability is an
entirely different matter.
http://searchwin2000.techtarget.com/originalContent/0,289142,sid1_gci1119283,00.html?track=NL-34&ad=526847

SEC WANTS SMBS TO VENT SOX PAINS | SearchSMB.com
The SEC Advisory Committee on Smaller Public Companies wants to know
what SMB executives really think of SOX. There's one week left to
participate in their online survey.
http://searchsmb.techtarget.com/originalContent/0,289142,sid44_gci1119419,00.html?track=NL-34&ad=526847

MORE TECH NEWS
Catch up on all the latest IT news!
http://searchtechtarget.techtarget.com/gateway/news?track=NL-34&ad=526847


BRAIN FOOD
......................................................................

SECRET WORD OF THE DAY
In digital audio production, this is the abrupt connection of one
audio file to another audio file so that they become one continuous
audio file. What is it?

Answer
http://Searchenterpriselinux.techtarget.com/definition/0,,sid39_gci876114,00.html?track=NL-34&ad=526847&offer=dq

TODAY'S TRIVIA QUESTION
Polishing is the use of unreadable dummy text in places reserved for
text when prototyping the design or general layout of pages. True or
false?

Answer
http://Searchenterpriselinux.techtarget.com/definition/0,,sid39_gci803884,00.html?track=NL-34&ad=526847&offer=dq

IT ALPHABET SOUP
Tux the penguin is the official Linux mascot. Does "Tux" stand for
anything?

Answer
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci513154,00.html?track=NL-34&ad=526847&offer=dq

LEARNING CENTER: RE-ENGINEERING -- A MIGRATION MIGRAINE |
SearchDataCenter.com
Everyone knows migration is an IT migraine. It costs money, and so
does its inherent "un-training," which is usually overlooked. Read
our tip to learn about it.
http://searchdatacenter.techtarget.com/tip/1,289483,sid80_gci1113007,00.html?track=NL-34&ad=526847

ADDITIONS AND UPDATES
......................................................................

clean room
http://whatis.techtarget.com/definition/0,289893,sid9_gci1117411,00.html?track=NL-34&ad=526847

Quagga
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci1117556,00.html?track=NL-34&ad=526847

ICE (In Case of Emergency)
http://whatis.techtarget.com/definition/0,289893,sid9_gci1118419,00.html?track=NL-34&ad=526847

insider threat
http://searchsecurity.techtarget.com/sDefinition/0,290660,sid14_gci1117699,00.html?track=NL-34&ad=526847

Nagios
http://searchenterpriselinux.techtarget.com/sDefinition/0,290660,sid39_gci1117704,00.html?track=NL-34&ad=526847

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

CONTACT US:

Sales
For sales inquiries, please contact us at:
mailto:bmcgovern@techtarget.com

Editorial
For feedback about any of our articles or to send us your article
ideas, please contact us at:
mailto:lthing@techtarget.com

::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::

ABOUT THIS E-NEWSLETTER

This e-newsletter is published by WhatIs.com, a targeted Web
site from TechTarget, the most targeted IT media and events company.
TechTarget offers magazines, Web sites, e-newsletters, Webcasts and
conferences for enterprise IT professionals.
Copyright 2005 TechTarget. All rights reserved.

_____________________________________________________________________

To unsubscribe from "Word of the Day":

Go to unsubscribe: http://WhatIs.com/u?em=pet.computter%40gmail.com&uid=3058509&cid=526847&track=NL-34

Please note, unsubscribe requests may take up to 24 hours to process;
you may receive additional mailings during that time. A confirmation
e-mail will be sent when your request has been successfully
processed.

Contact us:
WhatIs
Member Services
117 Kendrick Street, Suite 800
Needham, MA 02494