About Technology

update technology ,more fast more smart...

Cisco ISR Upgrades Gain Momentum on Secondary Market

Written by oneself on 7:27 AM

Salieri

July 5, 2007: Beginning with the 2005 release of Cisco Systems’ new Integrated Services Router (ISR) and culminating with an end-of-life announcement for the company’s legacy models in April of 2006, customers have begun to transition to Cisco’s next generation of networking devices. While Cisco will still offer technical support for their 1700, 2600 and 3600 series routers through 2012, customers are taking this opportunity to bolster their WAN infrastructure with Cisco’s latest offering.

Cisco’s Integrated Services Routers extend the company’s leadership in multi-service routing by transparently integrating advanced technologies, adaptive services, and secure enterprise communications into a single, resilient system. The ISR router series is designed to run simultaneous services such as data, security and quality of service (QoS) at wire speed in one compact, fully-integrated routing platform. This technology advance enables customers to account for network expansion or changes in technology as new services and applications are deployed.

Companies that have been relying on the 2600 are upgrading to the 2800 ISR because the 2800 offers a variety of expansion modules which offer built-in security and voice-over-IP acceleration, along with standard WAN features such as T1/T3 connectivity. These features are now built into the ISR, which previously had required either external modules or presented a burden on processor and memory resources. Companies are increasingly looking for fully-integrated solutions that provide switching/routing, security, voice over IP, optimization, and WAFS in a single, all-in-one device.

Cisco’s ISR line, including the 1800, 2800 and 3800, has experienced one of the most impressive growth rates in the company’s history. As of Q1 2007, Cisco had shipped more than 2 million units and reported $27.8 million in revenue from its WAN optimization products. Until very recently, Cisco’s Integrated Service Routers were predominantly available new from certified resellers; however, over the last twelve months, more and more integrated service routers have started showing up on the secondary market. With more options, customers who were previously hesitant to upgrade have started taking advantage of increasingly attractive deals and trade-in value.

The recent push to upgrade has resulted in a significant increase in business for many resellers on the gray market as owners of the older technology trade-up. Chris Hill of Townsend Assets Group, a leading used technology reseller reports a dramatic increase in technology acquisitions in the first quarter of 2007. "With companies seeking to maximize their network performance and keep their technological edge, we’ve seen a spike in both customer trade-ins and overall buying opportunities." Hill goes on to add, "End-of-life announcements do not necessarily mean these products are heading out to pasture. This means that another generation of Cisco routers will be handed down for small and start-up companies looking to reduce costs by buying used."

As companies push for more efficient and centralized network solutions, Cisco and other technology providers are understandably taking notice. With a total market expected to exceed $652 million by 2010, manufacturers as well as resellers are lining up to grab their share of the wide area network (WAN) optimization market.

Summary: Companies compelled to upgrade networks as Cisco ISRs hit Secondary market.

About Author: C. Jason is a freelance journalist for a variety of blogs and online publications, including Townsend Assets Group, Inc a leading used technology reseller that buys and sell used Cisco, Foundry Networks, and Juniper. For more info visit http://www.townsendassets.com.


Source: http://www.articlealley.com/article_187845_10.html

Read More......

Computer Safety Tips

Written by oneself on 4:21 AM

From Mary Landesman,

Achieving good computer security can seem like a daunting task. Fortunately, following the few simple steps outlined below can provide a good measure of security in very little time.

Use antivirus software and keep it updated. You should check for new definition updates daily. Most antivirus software can be configured to do this automatically.

  • Top Antivirus Software
  • Top Spyware Scanners

    Install security patches. Vulnerabilities in software are constantly being discovered and they don't discriminate by vendor or platform. It's not simply a matter of updating Windows; at least monthly, check for and apply updates for all software you use.

  • For Windows updates, visit the Windows Update Center
  • For all other updates, use the Secunia Software Inspector Firewalls are necessary even if you have a dial-up Internet connection - it takes only minutes for a a non-firewalled computer to be infected.

  • Free ZoneAlarm Firewall
  • Using the Windows Firewall

    Secure your browser. If you use Internet Explorer, you will be able to take advantage of the security zones settings to ensure optimum browsing safety. Not only will you enjoy safer browsing, you'll be able to eliminate unwanted pop-ups as well.

  • Securing Internet Explorer

    Take control of your email. Avoid opening email attachments received unexpectedly - no matter who appears to have sent it. Remember that most worms and trojan-laden spam try to spoof the sender's name. And make sure your email client isn't leaving you open to infection. Reading email in plain text offers important security benefits that more than offset the loss of pretty colored fonts.

  • Why Plain(text) is Better
  • How To Secure Your Email

    Treat IM suspiciously. Instant Messaging is a frequent target of worms and trojans. Treat it just as you would email.

  • Tips for IM Safety

    Avoid P2P and distributed filesharing. Torrent, Kazaa, Gnutella, Morpheus and at least a dozen other filesharing networks exist. Most are free. And all are rife with trojans, viruses, worms, adware, spyware, and every other form of malicious code imaginable. There's no such thing as safe anonymous filesharing. Avoid it like the plague.

    Keep abreast of Internet scams. Criminals think of clever ways to separate you from your hard earned cash. Don't get fooled by emails telling sad stories, or making unsolicited job offers, or promising lotto winnings. Likewise, beware of email masquerading as a security concern from your bank or other eCommerce site.

  • Internet Scams, Phishing, and Fraud

    Don't fall victim to virus hoaxes. Dire sounding email spreading FUD about non-existent threats serve only to spread needless alarm and may even cause you to delete perfectly legitimate files in response.

  • Hoax Encyclopedia
  • Urban Legends and Folklore

    Remember, there's far more good than bad on the Internet. The goal isn't to be paranoid. The goal is to be cautious, aware, and even suspicious. By following the tips above and becoming actively engaged in your own security, you'll not only be protecting yourself, you'll be contributing to the protection and betterment of the Internet as a whole.


  • source:about.com

    Read More......

    Securing your network, from home users to small business up to enterprise. What you can do.

    Written by oneself on 11:26 AM

    By: Paul Fleming

    With computers being a critical component in running a business, it is more valuable than ever to ensure the security of your networks particularly where there is sensitive data. News headlines announcing that networks have experienced security breaches are all too prevalent. This is where you need a service that checks for those vulnerabilities and prevents from future attacks. Better yet, you need a service that prevents it before it ever happens to your company. Imagine the embarrassment at having to explain to your customers that someone has stolen their credit card information.

    We continue to read headline after headline with news stories that credit card information or social security numbers were exploited. Some companies perform security audits on a regular basis. Certainly institutions like hospitals are required to perform these. But it's mostly small to mid-sized companies that are the most vulnerable.

    Hackers employ various methods for gaining access to systems. An audit often looks at replicating those methods, looking for vulnerabilities and weaknesses in the infrastructure. Affectionately known as Penetration Testing, it involves isolating mild, moderate and critical security threats and then determining the best course of action. When performing a Penetration test, a couple of key areas need to be targeted to ensure that a secure network system helps companies to avoid: - Preventing financial loss through fraud (hackers, extortionists and disgruntled employees) or through lost revenue due to unreliable business systems and processes. - Legal problems. Non-compliance can result in your organization losing business, receiving heavy fines, gathering bad PR or ultimately failing. At a personal level it can also mean the loss of your job, prosecution and sometimes even imprisonment. Poorly protecting your brand by avoiding loss of consumer confidence and business reputation.

    From an operational perspective, penetration testing helps shape information security strategy through identifying vulnerabilities and quantifying their impact and likelihood so that they can be managed proactively; budgets can be allocated and corrective measures implemented.

    For the average home user, there are some basic things, especially when setting up a wireless network at home that you can easily do to prevent users piggybacking on your network or even hacking in to it.

    Add a little security

    Change the SSID (name) of your network and disable the SSID broadcast. Disable DHCP Control MAC Address Filtering

    Add more security

    WEP Encrypt - adds an extra blocking mechanism for hackers

    Even more Security

    WPA - setting up a random pre-shared key of 10 characters ensures your network is practically rock-solid. This is a random string of numbers and letters, just make sure you can remember it yourself.

    These are some very basic steps to securing your data and ensuring your privacy. Keep in mind that small to medium business should do a little more to keep their information secure as there is even more valuable data ie. other people's.

    Article Source: http://www.superfeature.com


    Read More......

    Top 5 Tips For Protecting Your Computer

    Written by oneself on 7:00 PM

    by David Grahams

    Top 5 Tips For Protecting Your Computer

    Do you ever feel like you know just enough about PC Security to be dangerous? Let's see if we can fill in some of the gaps with the latest info from PC Security experts.

    Today, more and more people are using their computers for everything from communication to online banking and investing, to internet shopping.

    As we do these things on a more regular basis, we unknowingly open ourselves up to a multitude of online threats to our PC's security. These include but are not limited to potential hackers, attackers and crackers. In addition there are pieces of software, malware, adware and scripts containing Trojans and other such virus like nasties that are all intent on soliciting some form of information about us which may already be contained in personal files on our PC systems.

    1. Get a Router. If your broadband connection is through some form of modem (normally USB or cable) supplied to you by your ISP (Internet Service Provider), make sure you attach this to a Router and then attach that Router to your PC. Many people just attach the modem to their PC and then rely on Anti-Virus software to protect them. This is simply not enough nowadays, and they will surely have a problem somewhere down the line.

    2. Make regular Backups of your data and important information and keep it in a safe place that is separate from your computer. Nowadays there are a lot of different ways to achieve this, especially with the advent of DVD writers and low cost hard disks which enable a lot of data to be backed up and stored "offline".

    3. Keep your operating system, web browser and software updated frequently. If you have a Windows operating system, start by going to www.windowsupdate.microsoft.com and running the update wizard. This program will help you find the latest patches for your Windows computer. Also go to www.officeupdate.microsoft.com and locate possible patches for your Office programs. If you have Windows XP service pack2 installed (and it is recommended that you do, because it contains inbuilt security fixes) you can use the Security Center from the Control Panel to turn "Automatic Updates" on. This will keep your system updated with all the latest patches and fixes that Microsoft releases.

    4. Make sure you install a firewall. Without a good firewall, viruses, worms, Trojans, malware and adware can all easily access your computer from the Internet. Consideration should be given to the benefits and differences between hardware and software based firewall programs. Of course, if you use a router (which is recommended) this will already have a firewall built into it, and this can work in addition to any software firewall you choose to install on your PC.

    5. Check your internet browser and email client settings for optimum security. Why should you do this? Active-X and JavaScript are often used by hackers to plant malicious programs into your computers. While cookies are relatively harmless in terms of security concerns, they do still track your movements on the Internet to build a profile of you. At a minimum set your security setting for the "Internet zone" to High, and your "trusted sites zone" to Medium Low.

    I hope that reading the above information was both enjoyable and educational for you. Your learning process should be ongoing--the more you understand about any subject, the more you will be able to share with others.

    source : www.goarticles.com

    About the Author

    David Grahams is a successful Internet Marketer. In addition to writing articles and ebooks on Internet Marketing, he is also a qualified Microsoft Certified Systems Engineer, and is the author of the successful ebook "Ultimate Online Security". http://www.theidealebook.com/ultimateonlinesecurity.html


    Read More......