Vendors/Products - Page 64.6
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
Steve Grubb submits: Env_audit is a program that ferrets out everything it can about the environment. It is ideal for looking for security problems due to misconfiguration or software bugs. Software developers that write any program that shells out to . . .
An apparent delay in the availability of patches for the vulnerabilities in BIND that were disclosed earlier this week is once again highlighting the seemingly endless debate over when and to whom vulnerability data should be. . .
Agere Systems Inc. is demonstrating at Comdex this week a wireless LAN technology capable of transmitting data at 162 Mbits/second in the 5-GHz frequency band, three times the throughput achieved with an 802.11a device. The technology is targeted at home networking and entertainment as well as enterprise desktop PC applications. . .
ISS X-Force has discovered several serious vulnerabilities in the Berkeley Internet Name Domain Server (BIND). BIND is the most common implementation of the DNS (Domain Name Service) protocol, which is used on the vast majority of DNS servers on the Internet. . . .
VeriSign Inc hopes to give its digital certificate business a boost with next year's launch of enterprise instant messaging systems from AOL Time Warner Inc. VeriSign is providing security for the software, and expects to see "hundreds of thousands, if not . . .
Two companies announced Friday a new version of Security-Enhanced Linux, in a bid to build business from additions to the bare-bones operating system. The Open Source Development Group (OSDgroup), a Linux training firm, and Houston-based network consultancy Westcam have teamed up . . .
IBM and Consumer Direct Link, Inc. (CDL; Costa Mesa, CA) have co-developed the Paron MPC, a unique handheld PC which combines the functions of a PDA, Bluetooth wireless access, cellular telephone, and biometric fingerprint recognition, along with a security-oriented hardware/software architecture. . . .
Details of six flaws in Mozilla, the open source browser were posted on BugTraq at the weekend. Versions of Mozilla previous to version 1.0.1 contain multiple security vulnerabilities, so users need to update their browser software. The flaws could be . . .
The new FIU-600 model builds on the same encryption technology as Sony's FIU-710 Puppy, although this time as a stationary identification device for verifying employee access to multiple company PCs. The FIU-710 is designed as a mobile fingerprint passkey that . . .
The GNU Privacy Guard (GnuPG) is GNU's tool for secure communication and data storage. It is a complete and free replacement of PGP and can be used to encrypt data and to create digital signatures. It includes an advanced . . .
Following slow adoption of Active Directory after its release as part of Windows 2000 three years ago, Microsoft Corp. has been actively urging IT managers to deploy its directory services platform through aggressive pricing, detailed deployment road maps and increased support. . . .
Today marks the release of OpenBSD 3.2. This version comes with the new OpenSSH, asymmetric and symmetric encryption is now a default, Apache is chroot'd by default, there are fewer suid binaries, a few new pictures for xdm-logins, an anti-spoof . . .
As standards wars rage on in 802.11 wireless local-area networks, the Proxim Harmony 802.11a card shows the promise of a cost-effective wireless bandwidth adequate for video and data by cranking up wireless data rates to a theoretical 54 Mbits/second and beyond, . . .
UPDATE: Karl-Heinz Zimmer requested that I more accurately portray the situation. Since I don't believe that I can say it any better than he can, I have enclosed his email to me at the bottom of the . . .
In response to increasingly militant attacks carried out by hackers, system administrators across the spectrum of IT have worked diligently in recent months to remove telltale signs that can classify their Web servers. However, this may fashion a false sense of confidence. . .
It's depressing for security professionals to see just how many of the vulnerabilities on the new SANS/FBI Top 20 List have CVE numbers in the 1999-xxxx range -- meaning that they were identified and fixed years ago on some systems. Newer . . .
For those who don't know yet, Openwall GNU/*/Linux (or Owl) is a security-enhanced operating system with Linux and GNU software as its core, intended as a server platform. And, of course, it's free. More detailed information is available on the web site. . .
Intel plans to announce a new network processor on Tuesday that will handle security functions, a move it expects will reduce the cost and improve the performance of networking equipment. The company will also delay a similar product that does not offer security features.. . .
The latest flaw with a major Microsoft product shows Redmond is unlikely to have anything that approximates to secure software until 2004 at the earliest. That's the damning assessment of analysts Gartner in response to a serious, but little publicised, vulnerability . . .
Kevin Jurrens writes: Prentice Hall PTR and HP Books today announced the publication of "Halting the Hacker: A Practical Guide to Computer Security," Second Edition by Donald L. Pipkin, CISSP, Information Security Architect for the Internet Security Division of the Hewlett-Packard Company. "Halting the Hacker: A Practical Guide to Computer Security," Second Edition, combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system.. . .