Vendors/Products - Page 72
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This is the first in a series of documents I'm writing on utilizing EnGarde Secure Linux. In this document I show all of the necessary steps to enable the ftp daemon. Since it does not come enabled by default . . .
Products designed to boost security for mobile devices and on corporate networks are two of the main themes here at RSA Conference 2001 this week, with Motorola, Japan's Matsushita Electric Industrial, and the Internet division of Nokia all announcing new security . . .
Wireless Application Protocol (WAP) is an open standard that enables wireless devices to communicate independently of vendor or wireless networks and thus more easily access information and Internet services. WAP allows you to load data onto any kind of wireless device . . .
Soto, Government Computer News. Call me paranoid, but I'm in good company. Most biometric security programs -- which identify a person through their biological traits -- store details about a user's unique physical characteristics on a hard drive, and Robert Flores, . . .
Avaya Labs announced today it is releasing Libsafe(TM) 2.0, an enhanced version of its free security software for the popular Linux operating system. Libsafe version 2.0 adds the ability to protect against security attacks that exploit ``format string'' vulnerabilities in software, . . .
AVAYA Labs Research has released Libsafe 2.0, the latest version of its free security software for Linux systems, the company announced this week at CeBit. The new version of Libsafe shields servers from both buffer overflow and format string attacks, Avaya . . .
Network professionals will be able to more easily set up and configure Linux-based VPNs in branch offices with software, services and hardware from OpenReach and Penguin Computing. OpenReach and Penguin announced last week a turnkey Linux VPN package consisting of OpenReach . . .
Newest editions of InterScan VirusWall and eManager for Linux platforms guard against viruses, trojans, hacker agents and other unwanted content. NEW ORLEANS - Trend Micro Inc. will soon be able to offer gateway virus protection to the burgeoning community of open-source . . .
Companies that believe their networks can be completely protected by a phalanx of add-on security products may be in for a rude awakening. Underlying vulnerabilities, embedded and unseen many layers down in network infrastructures, may be unwitting invitations to even moderately . . .
For security-conscious system administrators, three letters have become a household word when it comes to securing remote computers: SSH. SSH, which is derived from the term "secure shell," is a set of standards for encrypting the commands and data sent . . .
Effective Monday, March 19 2001, five weeks after the release of the new SuSE-7.1 distribution, SuSE will discontinue support for the SuSE-linux distributions SuSE-6.0 SuSE-6.1 and SuSE-6.2.. . .
Lcrzo is a network library. Its main objective is to easily create network test programs. This library provides network functionnalities for Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols. It supports spoofing, sniffing, client and server creation. Furthermore, lcrzo contains . . .
This is a parody of the new internet server announced by Microsoft, Obsecurity. "This page contains answers to questions about Microsoft Obsecurity general issues. If the questions and answers below do not address your specific concern, please go to Knowledge Base . . .
Microsoft on Wednesday released what it bills as its first security software, a firewall and Web cache product. Internet Security and Acceleration (ISA) Server is the security and performance arm of Microsoft's .NET enterprise servers, the company said in a release. . . .
Intel is attempting to add security to the file-swapping technology made popular by music-sharing service Napster, by publishing an open source library of tools. Called the Peer-to-Peer Trusted Library, the tools enable application developers to add trusted elements such . . .
Indeed, many vendors, network administrators and security companies adopt a policy of less-is-more when it comes to the question of how much information to release to the public about a particular software bug, exploit or attack. . . .
Wireless devices, including laptop computers and PDAs that are widely used to access company networks, rely on a protocol that has "major security flaws" and are vulnerable to hackers using equipment they can obtain easily, a research group at the University . . .
Recently we held a promotion for "The FreeBSD Corporate Networker's Guide" and it was the perfect opportunity to ask our visitors to share some thoughts, and, receive a free copy of the book. The question we asked was: "Whick OS do . . .
MandrakeSoft is pleased to announce the beta version of Mandrake Security, based on Linux-Mandrake 7.2, released in alpha version on 28 december 2000. Its significant improvements are: functional web interface, possibility of configurating the firewall part via the web,correction of bugs. . . .
In response to the revelation of several holes in its BIND domain name server software this week, the Internet Software Consortium is starting a fee-based, members-only forum, a move that many observers feel will only worsen the software's security problems. The . . .