SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.

   Technology StocksNetwork Associates (NET)


Previous 10 Next 10 
To: deeno who wrote (5966)5/22/2001 12:01:10 AM
From: Gary Walker
   of 6021
 
How do you like the run up since January??

Share RecommendKeepReplyMark as Last ReadRead Replies (1)


To: Gary Walker who wrote (5976)5/22/2001 8:55:27 AM
From: deeno
   of 6021
 
sceptical, but morgan stanley just raise opinion to strong buy

Share RecommendKeepReplyMark as Last Read


To: Tim Robbins who started this subject5/23/2001 7:18:54 AM
From: Brian Slaybaugh
   of 6021
 
What do you think the Mcaffe and Microsoft deal will do for Neta? Anyone?

Share RecommendKeepReplyMark as Last ReadRead Replies (1)


To: Tim Robbins who started this subject5/31/2001 10:12:11 PM
From: Ojing Eo
   of 6021
 
Neta AV patent awarded (filed in 1998).
US6230288:
Method of treating whitespace during virus detection

Any of the inventors still work at NETA ?

delphion.com
biz.yahoo.com


A method is provided for detecting computer viruses that
infect text-based files. In accordance with a preferred
embodiment, a collection of virus signatures reflecting
sequences of characters or instructions known to be found
in such viruses is maintained on a computer system. A virus
detection program is also maintained for the purpose of
comparing the contents of computer files to the virus
signatures. Upon execution of the virus detection program,
whitespace within text-based files is transformed such that
each sequence of whitespace characters is replaced by a
single whitespace character. Virus signatures of viruses
known to infect text files are similarly transformed. A
transformed text-based file is then searched for at least
one of said virus signatures. The user is alerted to a
possible virus infection if any of the virus signatures are
found in a file. In another preferred embodiment, an
additional collection of at least one virus signature
containing sequences of characters or instructions known to
be found in viruses that infect executable computer files
is maintained on the computer system. A transformed text-
based file is searched for at least one of the additional
virus signature, which are not transformed before the
search.



Ojing

Share RecommendKeepReplyMark as Last ReadRead Replies (1)


To: Joanna Tsang who wrote (5968)7/5/2001 2:09:38 AM
From: Y-fall
   of 6021
 
Hey Joanna,

I went to another security comapany and we are in good shape!!! NETA is still in the hole since Billy screwed thinks up!!!

Hope your doing ok these days!!!

Share RecommendKeepReplyMark as Last ReadRead Replies (1)


To: Y-fall who wrote (5980)7/23/2001 7:08:06 PM
From: AlienTech
   of 6021
 
Did you cash out your 401K or are you riding the ferris wheel with it?

Share RecommendKeepReplyMark as Last Read


To: Ojing Eo who wrote (5979)7/23/2001 7:12:23 PM
From: AlienTech
   of 6021
 
Think I deserve 100 bucks for that one. I hate that date.

Share RecommendKeepReplyMark as Last ReadRead Replies (1)


To: AlienTech who wrote (5982)8/1/2001 2:57:58 PM
From: Ron
   of 6021
 
Code Red expected to affect Internet gradually
WASHINGTON/SAN FRANCISCO)
By Elinor Mills Abreu
SAN FRANCISCO, July 31 (Reuters) - Security experts on
Tuesday saw no immediate effect on the Internet from the
dreaded "Code Red" worm that was expected to have begun winding
its way through Web servers in a renewed attack.
But experts also cautioned that more time was needed to
assess the impact of the worm's forecast outbreak, which had
been expected to start as global clocks ticked over to midnight.
--
ECONOMIC IMPACT
Computer security vendor Network Associates Inc. <NETA.O>
on Tuesday reported that it had scanned more than 20,000
systems and detected more than 1,230 servers that remained
vulnerable to Code Red shortly before thekey deadline for a
renewed outbreak.
Even as network security experts tracked the progress of
the bug, one research organization attempted an initial tally
of its economic costs.
Computer Economics, based in Carlsbad, California,
estimated that Code Red has already cost an estimated $1.2
billion in damage to networks, ranking it below last year's
Love Bug virus ($8.7 billion) but above the Melissa virus of
1999 ($1 billion) in terms of destructiveness.
The cost of clean-up, monitoring and checking systems for
the Code Red, which has infected about 360,000 servers, was
near $740 million, said Michael Erbschloe, vice president of
research at Computer Economics.
The loss of productivity associated with the worm was near
$450 million, he said.
"Information technology people are not cheap," he said. "A
lot of companies have outsourced this and they have to pay
sometimes $300 an hour to have people come in and look at their
servers."

Share RecommendKeepReplyMark as Last Read


To: Brian Slaybaugh who wrote (5978)8/2/2001 8:41:17 AM
From: Ron
   of 6021
 
Seems like extensive press coverage of Code Red would boost stocks like NETA:
sei.cmu.edu
Code Red' Slams Thousands Of Sites
Bug Targets Web Servers
WASHINGTON, 4:33 p.m. EDT August 1, 2001 -- The "Code Red"
computer worm had infected about 80,000 Web sites as of 2:30 p.m.
ET -- prompting warnings that it could worm its way into a quarter of a
million of them within a day.
But there are also some encouraging signs. The
infection rates are slowing down with every
passing hour. And that's causing officials to be
more optimistic that they spread the word on
time, and that the final numbers won't be quite so
high. They've been calling on Web site operators
to install a software patch available from
Microsoft. When the worm -- which is like a virus
-- struck last month, it had only a day to spread
itself, before it turned to its next task of
targeting the White House Web site. This time,
it's expected to spend 20 days trying to spread.
There are fears that there could be a slowdown
across the Internet by the end of the day. But
officials are still hopeful that enough computers
have been inoculated to prevent major
interruptions. The head of research at a computer
security think-tank says the rate of infection
seems to be about what it was when the "worm"
first appeared last month. The worm, which is like
a virus, first appeared on July 19. It had just a
day to spread, before it went into attack mode
against the White House Web site. This time, it
has had the first 20 days of the month to spread.
The FBI says it's been spotted worldwide. It
doesn't target home computers -- just Web site
operators. But that can lead to slowdowns for all
Internet users. Early indications had been that
the worm hadn't turned into the Internet menace
it was feared to be. Then around 10 a.m. ET, CNN
reported that the FBI issued a warning that the
worm was starting to slow Internet traffic in
limited instances. The virus-busting CERT
Coordination Center reported at 8:30 a.m. ET that
the worm had gone active, as per predictions.
CERT "has seen evidence of exploitation and
scanning, and our staff members are currently
analyzing this activity. Early reports of activity
spanning the entire globe, including the United
States, indicate that the worm is presently
spreading throughout the Internet," the center
stated on its Web site. "As was the case in July
with its early progression, the worm's potential is
still unknown at this time." For updates from
CERT, click here After the warnings, many site
operators installed a software patch to ward off
the worm that was expected to re-emerge last
night. However, by early this morning there were
no indications that the worm was having any
major effect on the operation of the Internet.
Code Red infected several hundred thousand
computers during its first outbreak July 19.

Share RecommendKeepReplyMark as Last Read


To: Tim Robbins who started this subject8/8/2001 11:05:53 AM
From: AlienTech
   of 6021
 
Network Associates, Inc. (Nasdaq: NETA), announced today that it intends to offer, subject to market and other conditions, up to $300 million aggregate principal amount of Convertible Subordinated Notes due 2006 (excluding up to
an additional $45 million that may be issued upon the exercise of an option granted to the initial purchaser). The offering will be made only to qualified institutional buyers in accordance with Rule 144A under the Securities Act of 1933.

This news release does not constitute an offer to sell or a solicitation
to buy any of these securities. Any offers of the securities will be made
only by means of a private offering memorandum. The securities to be offered
will not be registered under the Securities Act of 1933, as amended, or
applicable state securities laws, and may not be offered or sold in the United
States absent registration under the Securities Act and applicable state
securities laws or available exemptions from such registration requirements.

Share RecommendKeepReplyMark as Last Read
Previous 10 Next 10