Vendors/Products - Page 72

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

EnGarde FTP HOWTO

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is the first in a series of documents I'm writing on utilizing EnGarde Secure Linux. In this document I show all of the necessary steps to enable the ftp daemon. Since it does not come enabled by default . . .

Wireless security makes headway

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless Application Protocol (WAP) is an open standard that enables wireless devices to communicate independently of vendor or wireless networks and thus more easily access information and Internet services. WAP allows you to load data onto any kind of wireless device . . .

Turnkey Linux package eases VPN installation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network professionals will be able to more easily set up and configure Linux-based VPNs in branch offices with software, services and hardware from OpenReach and Penguin Computing. OpenReach and Penguin announced last week a turnkey Linux VPN package consisting of OpenReach . . .

Trend Micro offers virus protection for Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Newest editions of InterScan VirusWall and eManager for Linux platforms guard against viruses, trojans, hacker agents and other unwanted content. NEW ORLEANS - Trend Micro Inc. will soon be able to offer gateway virus protection to the burgeoning community of open-source . . .

A sharp eye for security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies that believe their networks can be completely protected by a phalanx of add-on security products may be in for a rude awakening. Underlying vulnerabilities, embedded and unseen many layers down in network infrastructures, may be unwitting invitations to even moderately . . .

Ssh! Don't use that trademark

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For security-conscious system administrators, three letters have become a household word when it comes to securing remote computers: SSH. SSH, which is derived from the term "secure shell," is a set of standards for encrypting the commands and data sent . . .

lcrzo and lcrzoex Version 3.03

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lcrzo is a network library. Its main objective is to easily create network test programs. This library provides network functionnalities for Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols. It supports spoofing, sniffing, client and server creation. Furthermore, lcrzo contains . . .

Microsoft Obsecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a parody of the new internet server announced by Microsoft, Obsecurity. "This page contains answers to questions about Microsoft Obsecurity general issues. If the questions and answers below do not address your specific concern, please go to Knowledge Base . . .

Microsoft launches first security product

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft on Wednesday released what it bills as its first security software, a firewall and Web cache product. Internet Security and Acceleration (ISA) Server is the security and performance arm of Microsoft's .NET enterprise servers, the company said in a release. . . .

Intel adds security to file-swapping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intel is attempting to add security to the file-swapping technology made popular by music-sharing service Napster, by publishing an open source library of tools. Called the Peer-to-Peer Trusted Library, the tools enable application developers to add trusted elements such . . .

Wireless Security Flawed, Researchers Report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless devices, including laptop computers and PDAs that are widely used to access company networks, rely on a protocol that has "major security flaws" and are vulnerable to hackers using equipment they can obtain easily, a research group at the University . . .

Your Opinion: "Most Secure OS"

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recently we held a promotion for "The FreeBSD Corporate Networker's Guide" and it was the perfect opportunity to ask our visitors to share some thoughts, and, receive a free copy of the book. The question we asked was: "Whick OS do . . .

The Beta version of Mandrake Security is available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MandrakeSoft is pleased to announce the beta version of Mandrake Security, based on Linux-Mandrake 7.2, released in alpha version on 28 december 2000. Its significant improvements are: functional web interface, possibility of configurating the firewall part via the web,correction of bugs. . . .