HP calls Oracle’s secrecy claim a ‘cheap shot’

Hewlett-Packard and Oracle continue to throw mud in a legal dispute over the decision to abandon the wicked Oracle support for Itanium systems, in which each side accusing the other of unfair publicity stunts and confidentiality.

On Thursday, HP has responded to the demand for Oracle last month that HP tried to information that would be its position in the case of hiding weaken.

“Oracle’s opposition, who, trying to lock their complaint under HP-file argument to suppress the truth on the basis of its claims against Oracle. Nothing could be further from the truth, “wrote lawyers for HP.” There is not one word of complaint to HP, as HP is not willing – indeed eager to make public -. ”

HP uses Intel’s Itanium processors in its server operating system with HP-UX. HP has chosen Oracle violation of a contractual agreement when it is necessary to stop developing new software for Itanium. Oracle said there was no such legal agreement.

HP filed its complaint under seal parts, including the conditions of an agreement on dispute settlement in the lawsuit as against its former CEO of HP, Mark Hurd, filed, after taking a job with Oracle. The setting included a contractual obligation between the companies to support more products, according to HP.

Oracle has downplayed the importance of the pact, calling it no longer show as a “corporate hug”, the company had ended their feud. Oracle also said that HP has tried to keep the agreement on dispute settlement under a bushel, because the release would be detrimental to its cause.

This is far from the truth, HP said in its filing Thursday.

“When Oracle knows HP filed its complaint with published references to the Settlement Agreement, as at the urging of all parties – Oracle, HP and Hurd – the agreement includes a provision that the parties which prevents them from disclose the terms of the agreement for all purposes, “said HP. “HP has been committed, the conditions of strict confidentiality clause of honor and took to the appropriate procedural steps.”

However, Oracle has decided to “land a low blow” against HP, the filing continues through “inappropriate doping record with inflammatory and misleading statements about the merits of the action.”

HP reiterated his belief that Oracle has a commitment to continue to be made with HP.

“Oracle argues that the provision is simply a” general statement of non-contractual “partnership”, the “HP can not seriously claim that” Oracle also requires its database and other software on HP platforms port ” the filing states. ” But that is exactly what the General Counsel, Oracle said HP specifically designed to provide in the negotiations on the agreement. ”

While HP is ready to make an unexpurgated version of its public, the agreement should remain in dispute settlement next to the section on contractual obligations, the United HP deposition sealed.

HP Oracle describes the position, without specific allegations in their petition.

“Oracle is not interested in anything public resistance,” Oracle said in a brief statement. “The complaint disclosed and the agreement on dispute settlement in full without delay.”

IBM and Juniper collude on the cloud

IBM and business partner Juniper Networks have announced hybrid network-based services.

Companies using a “private cloud”, or internal network services modeled on the Internet, will now be able to assign applications to the “public cloud”, or public internet services, from a centrally managed console, called the IBM Cloud Management Console.

IBM said in a statement on Tuesday that this “overflow cloud” capability will allow customers to priorities applications when resources become constrained. Continue reading “IBM and Juniper collude on the cloud”

VoIP, the review of the network provides a saving of hospital, unified communications

A year ago, of Ottawa, Illinois-based Centre runs an analog phone system powered by T-1 and a 10/100 Ethernet network independent data would not support an IP telephony system and much less battery high bandwidth medical applications are becoming increasingly necessary, says Curt Sesto, director of facilities management, construction and electronics to the center.

8 iPhone VoIP applications that can help you save minutes

Now, Ottawa Regional has installed a fiber ring 10G bps at its campus of 31 acres and is in the midst of changing all of its IP phones with the ability to enable unified communications (UC) has said. The ring, which is owned and operated by the Ottawa Regional eliminates a series of point to point AT & T, T-1 lines connecting the eight buildings on campus, he says.
Continue reading “VoIP, the review of the network provides a saving of hospital, unified communications”

Juniper merges network core elements to cut carrier costs

Juniper Networks is developing a massive change that would replace the IP (Internet Protocol) routers in core networks and service providers to combine optical and electronic media that now exist in separate systems with dedicated staff.

The PTX series of transport packets Switch platform, of which the first products will be delivered in the first quarter of next year, combines two technologies that companies use to avoid driving in the center of their networks. Involves routing processor-intensive work to examine each packet, and often it is not necessary for traffic just to cross the network core. In contrast, companies using MPLS (Multiprotocol Label Switching) and optical switching, neither of which requires complete understanding of routing traffic to move through the core.
Continue reading “Juniper merges network core elements to cut carrier costs”

7 ways to avoid getting hacked by Anonymous

The hactivist group Anonymous used a series of simple technical and social exploits to crack the network of security-technology firm HBGary Federal, giving the company a schooling that other network security pros can learn from.

The overriding lesson: Meticulously follow the basic best-practices of corporate defense. But there are more detailed takeaways for those who are willing to learn from HBGary Federal’s mistakes. (For a detailed account of just how Anonymous cracked HBGary Federal, check out this thorough Ars Technica story.)

THE LATEST SECURITY PICTURES: Hot products from RSA 2011

HBGary Federal ran afoul of Anonymous when CEO Aaron Barr said he planned to name members of the secretive international group that famously came to the defense of WikiLeaks. Anonymous DDoSed businesses that tried to take down WikiLeaks sites that expose U.S. State Department diplomatic cables.

HBGary Federal suffered the public posting of tens of thousands of its e-mails and the defacing of its Web site and Barr’s Twitter page, as well as a black eye to its reputation as a security firm.

Here are seven lessons to learn:

1. Don’t assume what type of attack you will suffer. Barr thought Anonymous would only launch a DDoS attack against the company’s Web site, just as it had against others. That turned out not to be the case.

2. Use a tried and tested content management system that comes with updates, patches and support. HBGary used a custom CMS for its Web site that was susceptible to SQL injection attacks that led to Anonymous accessing data in HBGary’s database.

3. Thoroughly hash and rehash passwords stored in databases. HBGary did hash its passwords, but didn’t add extra characters that have to be removed to reveal the actual password. Nor did it rehash the hashed passwords to add layers of complexity to brute forcing the passwords out of the hash. The passwords would still have been susceptible to brute-force attacks, but it would have taken a lot longer to succeed.

4. Use strong passwords. Long passwords that use the full range of characters represented on computer keyboards are much harder to break because they rule out the use of rainbow tables — lists of hashes and the passwords they represent. If passwords are composed of long strings of characters and the characters are drawn from all the characters on the computer keyboard (not just letters and numbers), hashes of the passwords become so complex that it isn’t practical to create rainbow tables for them. Two key HBGary Federal executives used simple eight-character passwords — two numbers and six letters. Rainbow tables worked on them.

5. Don’t reuse passwords. Some HBGary executives used the same passwords for access to the company’s CRM system as they did for its Google Apps e-mail, as they did for Twitter, as they did for SSH authentication to company storage servers. One of the cracked passwords was for the company’s e-mail administrator’s Google account, which led to all the company’s e-mails being hacked.

6. Keep current with patches. Key HBGary servers had a known privilege-elevation flaws for which patches existed. Anonymous exploited the vulnerabilities.

7. Heighten user awareness of social engineering. Anonymous sent e-mails from the hacked account of HBGary founder Greg Hoglund to a network administrator requesting key information as if Hoglund himself were asking. In response, the admin opened firewall ports and gave up Hoglund’s user name and password for root access to the servers supporting the company’s rootkit.com Web site.