Vendors/Products - Page 57

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Introduction to Enterprise Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The concept of an enterprise linux offering is that you have a fairly long time between releases (12-24 months) and a product that remains supported for an even longer period of time than the release cycle. This allows for stable server deployments with guaranteed bug fixes and security updates for an extend period of time (up to 5 years). Before the enterprise offerings, when the security updates stopped for a product, it was time to upgrade ... and that could be as frequently as every 12 months. Now that same business can expect bug fixes and updates for 5 years, meaning now normal application upgrades can drive the process, and not the need to upgrade your operating system. . . .

Linux vendors attack analyst report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux vendors Debian, Mandrake, Red Hat, and SuSE have hit back at research which claims that Linux and Microsoft products are both secure. In a report released late last month entitled Is Linux more Secure than Windows?, analyst Forrester said: "Microsoft gets a bad rap for security, while many believe that Linux is relatively secure. . . .

Back to Linux Basics With Debian GNU/Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Debian is a solid Linux distribution tended with much care and dedication by a global network of developers. Because of its relatively slow development cycle, it isn't the most cutting-edge in terms of the software available in the Linux world, but it is studiously maintained in terms of patches and security fixes. Consequently, Debian is a rock-solid and stable platform on which to run many infrastructure mainstays, such as DNS, file/print services, and Web servers. Its suitability for these purposes is limited only by the amount of in-house Unix/Linux expertise available in a given organization. . . .

E-security firm backs Novell's Play

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Novell's bet that Linux will break Microsoft's global grip on network servers and computer desktops arguably is a gamble of make-or-break proportions.     But Montreal, Canada-based e-security company Gwava is backing the play, convinced Novell holds the ace in the hole. . . .

Linux Gets Tighter Locks With New AV Solutions

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In the big bad world of worms and viruses, the virtually unbreakable Linux Operating System - which gained cult status because of its legendary core stability - is quickly donning the mandatory `Antivirus helmet' to become infallible. The alarming frequency of security attacks has prompted many Antivirus companies to dish out Linux specials, with MicroWorld and F-Secure recently joining the list. . . .

Trustix product line split

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In essence, Trustix is issuing a new Enterprise version, which will contain memory-stack protection. The freely-available standard product will actually have support for memory-stack protection removed. . . .

Immunix stops selling secure Linux OS, concentrates on security appliances

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to Immunix COO Frank Rego, his company's decision to stop selling Immunix Linux wasn't a sudden shift but "more of a gradual change. We started in the appliance business with Trend Micro and Websense in the middle of last year." There was a layoff this week, but not a huge one. Rego says the company is now down to 20 employees from a high of about 25. He also says he hopes the company can start turning a profit by the end of 2004 -- but admits that he is an optimist. . . .

Immunix stops selling secure Linux OS

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

According to Immunix COO Frank Rego, his company's decision to stop selling Immunix Linux wasn't a sudden shift but "more of a gradual change. We started in the appliance business with Trend Micro and Websense in the middle of last year." . . .

Trustix 2.1 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is to announce the release of Trustix Secure Linux 2.1, nicknamed "Horizon". It is the second release in the Trustix 2 series. Its main purpose is to serve as a stability release, and it is the natural successor of Trustix 2.0. In addition, we have added a few more features including Samba 3, IBM's stack protector and the XFS filesystem. We have also updated most of the packages to the latest stable version. . . .

LLV Imports: Establishing a Secure E-Commerce Storefront

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

With no security breaches so far, LLV Imports is more than satisfied with products and support received from Guardian Digital. "Security is a huge concern of mine. Staying current with security patches and having an easy way to implement them is important to keeping my store and my customers' information secure. With Guardian Digital helping to manage our Internet presence, I can sleep well at night." . . .

F-Secure apologises for sending customers Netsky.B via mailing list

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Antivirus firm F-Secure has apologised for sending the Netsky.B virus to several thousand of its UK customers and partners via a mailing list. The email apology said: "Because of a human error, you may have received an email infected with the Netsky.B virus that was relayed through our external email list server and was resent to our UK mailing list. . . .

Leaky Windows

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Now some of Microsoft's closely guarded source code is floating freely on the Web, at least some of Windows made open-source, albeit illegally. Whatever Microsoft's investigation of the leak turns up, it's a sure bet that hackers, many of whom claim only to want to learn programming technology are already on the case. Should attacks flow from revelations in the leaked code, look for Microsoft to remind us that such risks were why it kept the source code secret in the first place. . . .

Red Hat releases 2.6 test version of Fedora

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat Inc. announced Thursday the release of a test version of Fedora Core 2 that is based on the recently released 2.6 Linux kernel. Our readers are probably already aware that 2.6 integrates a whole lot more security into the kernel than was previously the case, including hooks for SELinux, IPSec, and ACLs. Fedora is a hobbyist version of Linux that is constantly being updated and likely does not offer the stability an enterprise would require for its mission-critical systems. This is the first of three phases of the Fedora Core 2 release schedule, which runs through April 19, said Brian M. Stevens, vice president of engineering. . . .

First Fallout from Code Leak Hits the Web

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

We have not covered much about the Microsoft source code leak that has been inundating the computer security news-sites recently, mostly because its not very relevant to open-source security. However, an exploit has been found due to the leak already. This brings up one of the major bonuses of open-source code: it does not at all depend on obscurity. Defense-by-obscurity leads to sloppy coding habits and opens the door to massive security vulnerabilities should the code be leaked, especially if its no longer supported, but still widely used, like Windows 9x. Bear in mind that, according to the Microsoft EULA, no one else is technically allowed to patch the code, and Microsoft likely won't. They might even claim that the ruling against them on the Java VM issue with Sun means that they cannot, since that was the reason given for dropping support for legacy products in the first place. . . .

Red Hat unveils Linux security upgrades

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat is enhancing the security model in the next version of Red Hat Enterprise Linux to include support for Security-Enhanced Linux (SE Linux). Red Hat Enterprise Linux 4.0, due out in 2005, will support the National Security Agency-funded SE Linux project, which adds multi-level security to the operating system (OS). . . .