Vendors/Products - Page 61

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Innominate wins Wolfsburg prize for tiny embedded Linux security device

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A tiny network security device running embedded Linux has earned Innominate the Wolfsburg AG Competence Prize, this year awarded for the IT category in the field of "Network Embedded Systems." Judges in the 25,000 Euro annual prize for industry co-sponsored by Volkswagon and the city of Wolfsburg praised Innominate for building a security device on an open architecture. . .

To Fix Software Flaws, Microsoft Invites Attack

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft's Security Response Center in Redmond, Wash., is the computing equivalent of a hospital emergency ward. When a problem comes in the door the center's director, Kevin Kean, and his staff must swiftly make an assessment: Is the security weakness detected in a Microsoft software product only minor?. . .

OS dominance paper branded 'marketing by fear'

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A report claiming that Microsoft's operating system "monopoly" poses a critical security risk to users has drawn harsh criticism from technology professionals. While the group of researchers claimed intellectual and financial independence from outside parties, as well as from their own parent companies. . .

OpenSSH 3.7 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

OpenSSH 3.7 has just been released. It will be available from the mirrors listed at OpenSSH shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. . .

Make Secure BGP

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Jan Kanclirz submits Make Secure BGP, paper describing different security meassures one can take to better secure BGP environment. Using authentication, encryption and filtering technigues on Cisco platform. . .

How many security vulnerabilities a month are acceptable?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Reading through responses to an article I wrote about Mad Hatter and the broader subject of auto-immune code, and since I am working on a project for a client that involves Sun products in a security context, it begs me to ask the question - are twenty security vulnerabilities in one month an acceptable number for Sun customers?. . .

Security software brand awareness low

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Despite a renewed focus on IT security, 28 percent of senior executives and IT managers in Ireland are unable to name a security software brand. That finding is in the results of a research report from IDC, which polled 327 executives . . .

RISC Processor Takes Network Security Onboard

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The SH7710 32bit RISC microprocessor features an IPsec accelerator for fast encryption and communication processing. The device also offers two on-chip Ethernet controllers that enable connection to two Ethernet LANs. Both peripherals make it suitable for security-enabled devices designed . . .

Magnifire TrafficShield

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Application Flow model may be best described as an automatic analysis of content. Based on how a user interacts with an application over time, policies are designed to allow the user leeway to accomplish their task. Generating policies of . . .

Apache 1.3.28 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Apache Software Foundation and The Apache Server Project are pleased to announce the release of version 1.3.28 of the Apache HTTP Server ("Apache"). This Announcement notes the significant changes in 1.3.28 as compared to 1.3.27. . .

DoS Holes Plugged in Apache HTTP Server

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The Apache Software Foundation on Monday released a new version of its open-source Web server project to plug four potentially serious security holes. The latest update to the Apache 2.0 HTTP Server (version 2.0.47) is described as a security and bug . . .

AirTraf: A handy Wi-Fi site survey tool

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Last month I used NetStumbler under Windows to search for wireless access points in my travels. This month I gave a Linux-based alternative a spin. AirTraf is a basic site survey tool that looks for 802.11b access points and displays traffic . . .

FreeS/WAN 2.01 Released

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

FreeS/WAN 2.01 has shipped and is available as both source and binary RPM's. This is an important release for anyone using Opportunistic Encryption (OE) as there is a small but serious change to the OE protocol. For now the protocol is . . .

Security Researchers Nibble at Bluetooth

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

On Tuesday the organization responsible for the Bluetooth wireless standard unveiled version 1.2 of its official spec at the Bluetooth World Congress in Amsterdam. But for real evidence that that the technology is finally gaining acceptance turn to the conference program . . .