Vendors/Products

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Microsoft's Anti-Spam Moves Lack Teeth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft's recently-announced anti-spam add-on for Exchange Server 2003 may be a first step in the company's assault on enterprise junk mail, say analysts, but the move is neither a threat for third-party software makers already in the market, nor of much use to large corporations.. . .

Red Hat Offers New Security Course

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat Tuesday said it is offering a new training course, designed to improve the security skills of users. The course, called RH423 Red Hat Enterprise Directory Services and Authentication, will cover directory services, authentication and security configuration for companies . . .

Cisco Combats Network Worms

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Cisco Systems is to combat the spread of computer worms across internal networks. Cisco's Network Admission Control program is designed to minimise the threat posed when mobile or guest users connect infected PCs to internal company networks. . .

Red Hat Fixes Vulnerabilities In Four Areas

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Micael Mimoso submits Red Hat recommends users upgrade to updated packages that address security vulnerabilities in PostgreSQL, stunnel, XFree64, and Zebra. The consequences of the vulnerabilities include denial of service, execution of arbitrary code and privilege escalation. . .

SSL networking heats up

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The market is heating up for products that allow secure access to corporate networks based on a widely used browser security technology known as secure sockets layer encryption. Cisco Systems became the latest company to introduce a virtual private network (VPN) . . .

Oracle Row Level Security: Part 1

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In this short paper I want to explore the rather interesting row level security feature added to Oracle 8i and above, starting with version 8.1.5. This functionality has been described as fine grained access control or row level security or virtual . . .

A VA Scanner Geeks Will Love

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks are dynamic, constantly changing with the addition of new devices and services--each with vulnerabilities and risky configurations. Vulnerability assessment tools that take snapshots don't reflect this ceaseless flux. That's where Tenable Network Security steps in, taking a completely passive approach . . .

Security Considerations for Layer 3 Switches

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Heightened awareness of security issues on the part of IT administrators is, for the most part, a good thing. But there is a downside -- it has pushed vendors to integrate security into products ad infinitum. In the switching world, newly added features of layer 3 routing switches are starting to make these products resemble firewalls.. . .

Devil-Linux 1.0: The (hell)firewall

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Today, Halloween, marks the debut of Devil-Linux 1.0, a runs-from-CD (or USB flash device) firewall/router distribution designed to give you a large amount of security in return for very little setup work. The Halloween release date and the 'Devil-Linux' name . . .

Security firm takes trusted Linux onboard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Secure Linux operating system and software provider Trustix was today acquired by internet security company Comodo. Financial terms of the deal were not disclosed. Comodo, which is best known as a certification authority for SSL certificates, said that the deal will . . .

Vendors face security calls

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sun's chief security officer last week said that vendors should bear legal responsibility for any security vulnerabilities found in their software, and should work harder to build more secure platforms and applications.. . .

IBM expands wireless security service

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Big Blue said its wireless intrusion detection service is designed to help customers protect themselves against security breaches on wireless local area networks. The service includes Linux-based sensors that detect irregularities in the wireless network and identify unauthorized or unsecured access . . .

Smart cards get really smart

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Researchers at the University of Pennsylvania have developed smart credit cards with embedded microchips. What's new about is a technique which lets ordinary card users program in their own spending parameters.. . .