Vendors/Products - Page 60.85

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

PHLAK 0.2 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

PHLAK 0.2 has been released. With many bug fixes and an overall better feel and look, 0.2 will deliver what we had hoped 0.1 would have. Head over to www.phlak.org to grab your copy and start testing. PHLAK . . .

Review: Antivirus Products

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Late summer brought a rude awakening for those network managers who felt secure in their virus-containment strategies. W32/ Blaster, W32/Welchia and Sobig.F waltzed through the Internet in rapid succession, leaving billions of dollars in damage in their wake.. . .

Gentoo Rsync Rotation Server Compromised

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On December 2nd at approximately 03:45 UTC, one of the servers that makes up the rsync.gentoo.org rotation was compromised via a remote exploit. At this point, we are still performing forensic analysis. However, the compromised system had both an IDS and a file integrity checker installed and we have a very detailed forensic trail of what happened once the box was breached, so weare reasonably confident that the portage tree stored on that box wasunaffected.. . .

Exploiting Cisco Routers: Part 2

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Welcome back! The first article in this two-part series covered a few different methods of getting into the target router. This article will focus on what we can do once we've gotten in. For the remainder of this article, we'll assume . . .

OpenEvidence: the open source for notarisation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Financed by the European community, OpenEvidence -part of European Project Group FP5- is an open source framework for data certification, time stamping and data archival that brings technology for evidence creation, validation and long term protection of documents.. . .

Microsoft's Anti-Spam Moves Lack Teeth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft's recently-announced anti-spam add-on for Exchange Server 2003 may be a first step in the company's assault on enterprise junk mail, say analysts, but the move is neither a threat for third-party software makers already in the market, nor of much use to large corporations.. . .

Red Hat Offers New Security Course

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat Tuesday said it is offering a new training course, designed to improve the security skills of users. The course, called RH423 Red Hat Enterprise Directory Services and Authentication, will cover directory services, authentication and security configuration for companies . . .

Cisco Combats Network Worms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco Systems is to combat the spread of computer worms across internal networks. Cisco's Network Admission Control program is designed to minimise the threat posed when mobile or guest users connect infected PCs to internal company networks. . .

Red Hat Fixes Vulnerabilities In Four Areas

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Micael Mimoso submits Red Hat recommends users upgrade to updated packages that address security vulnerabilities in PostgreSQL, stunnel, XFree64, and Zebra. The consequences of the vulnerabilities include denial of service, execution of arbitrary code and privilege escalation. . .