We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

User authentication

User authentication News

Open Wireless Router firmware aims for better router security, network performance

The new custom router firmware will allow users to share their wireless networks, but could also improve their router's security read more »

Home router security to be tested in upcoming hacking contest

Researchers will compete to exploit previously unknown vulnerabilities in popular home routers read more »

Why the Microsoft Active Directory design flaw isn't serious

Don't panic but take remedial measures read more »

Critical design flaw in Active Directory could allow for a password change

Microsoft contends the general issue has been long-known, but Israel-based Aorato has developed a working attack read more »

Future Java 7 security patches will work on Windows XP despite end of official support

Windows XP users will continues to receive Java 7 security updates until at least April 2015, Oracle says read more »

AWS rolls out enterprise document storage and sharing

The service, called Zocalo, was highlighted at an Amazon Web Services event read more »

more news ..

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.


Windows 8

Windows 8

Check out our latest articles on Microsoft's next-generation operating system.


Securing the Enterprise

 Join ComputerworldUK's editor in chief, Mike Simons, and Dell executives in a series of video discussions on how to respond to cyver criminals.


HP acquisitions

HP acquisitions

Following HP's dispute with Autonomy, we look back at other HP acquisitions in this Computerworld UK slideshow.


Advertisement
User authentication In Depth

Beware the next circle of hell: Unpatchable systems

Insecure by design and trusted by default, embedded systems present security concerns that could prove crippling read more »

How Windows Enterprise BranchCache increases network efficiency

Be productive while remaining secure read more »

OpenStack 101: The parts that make up the project

Understanding the building blocks read more »

Gartner tells IT executives how to enable enterprise collaboration

Why is it so hard? read more »

How to defend against the OpenSSL Heartbleed flaw

Basic steps for IT CIOs, CISOs and IT Directors to take now read more »

Security should no longer be 'cementing' the status quo

If your security programme is struggling, don't stick with it because it's the way things have always been done read more »

more in depth ..
User authentication Slideshows

Microsoft's SME offerings

Microsoft takes us around a Kelly Hoppen designed apartment to show us its collaborative business products read more »

Top two-factor authentication tools

Quick steps to improved ID and security management read more »

RSA 2013: Six security startups

These companies are tackling today's biggest security issues, from cloud security to authentication to mobile device management - See more at: http://www.infoworld.com/slideshows#sthash.woGoAN8P.dpuf read more »

Mageia - A rising Linux star

If the world of Linux distributions has ever had a rising star, it's Mageia. Read on for a brief tour of Mageia's interface and features read more »

more slideshows ..
White Papers

Avoiding the 7 Deadly Sins of IT Security

Prevention is more important than detection read more »

What Do You Mean My Cloud Data Isn’t Secure?

Understanding your level of data protection read more »

more white papers ..

ComputerworldUK Knowledge Vault

ComputerworldUK
Share
x
Open