Vendors/Products - Page 61
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
A tiny network security device running embedded Linux has earned Innominate the Wolfsburg AG Competence Prize, this year awarded for the IT category in the field of "Network Embedded Systems." Judges in the 25,000 Euro annual prize for industry co-sponsored by Volkswagon and the city of Wolfsburg praised Innominate for building a security device on an open architecture. . .
Escalating threats of hacking and viruses prompt explosive growth, says IDC. Spending on security and business continuity will grow at twice the rate of other IT categories to reach $116bn by 2007.. . .
Microsoft's Security Response Center in Redmond, Wash., is the computing equivalent of a hospital emergency ward. When a problem comes in the door the center's director, Kevin Kean, and his staff must swiftly make an assessment: Is the security weakness detected in a Microsoft software product only minor?. . .
A report claiming that Microsoft's operating system "monopoly" poses a critical security risk to users has drawn harsh criticism from technology professionals. While the group of researchers claimed intellectual and financial independence from outside parties, as well as from their own parent companies. . .
Intel has announced it was taking steps to ensure that its design for the next generation of computer security components, code-named LaGrande, will be accepted and not vilified by the industry. . .
A security flaw in Linux editions of IBM's DB2 database could allow unauthorized users to seize control of a database's contents, Big Blue has revealed. IBM said that the problem affects version 7 of its DB2 database for Linux.. . .
OpenSSH 3.7 has just been released. It will be available from the mirrors listed at OpenSSH shortly. OpenSSH is a 100% complete SSH protocol version 1.3, 1.5 and 2.0 implementation and includes sftp client and server support. . .
Jan Kanclirz submits Make Secure BGP, paper describing different security meassures one can take to better secure BGP environment. Using authentication, encryption and filtering technigues on Cisco platform. . .
Reading through responses to an article I wrote about Mad Hatter and the broader subject of auto-immune code, and since I am working on a project for a client that involves Sun products in a security context, it begs me to ask the question - are twenty security vulnerabilities in one month an acceptable number for Sun customers?. . .
Despite a renewed focus on IT security, 28 percent of senior executives and IT managers in Ireland are unable to name a security software brand. That finding is in the results of a research report from IDC, which polled 327 executives . . .
POSIX® certification is about to take another step forward. The Open Group and The Institute of Electrical and Electronics Engineers Standards Association (IEEE-SA) will offer a program to certify products to the 2003 edition of IEEE 1003.1TM-2001, "Standard for Information Technology-Portable . . .
The SH7710 32bit RISC microprocessor features an IPsec accelerator for fast encryption and communication processing. The device also offers two on-chip Ethernet controllers that enable connection to two Ethernet LANs. Both peripherals make it suitable for security-enabled devices designed . . .
Seizing the opportunity to criticize a competitor and promote its own operating system, Sun Microsystems on Wednesday opened up early registration for its Project Mad Hatter. Designed to compete with Microsoft, Project Mad Hatter is being positioned by Sun as . . .
The Application Flow model may be best described as an automatic analysis of content. Based on how a user interacts with an application over time, policies are designed to allow the user leeway to accomplish their task. Generating policies of . . .
Security will move farther from the fallible hands of users and closer to the heart of the computer with a deal announced by Intel (Nasdaq: INTC) and Wave Systems (Nasdaq: WAVX) . The deal will help bridge the gap between . . .
The Apache Software Foundation and The Apache Server Project are pleased to announce the release of version 1.3.28 of the Apache HTTP Server ("Apache"). This Announcement notes the significant changes in 1.3.28 as compared to 1.3.27. . .
The Apache Software Foundation on Monday released a new version of its open-source Web server project to plug four potentially serious security holes. The latest update to the Apache 2.0 HTTP Server (version 2.0.47) is described as a security and bug . . .
Last month I used NetStumbler under Windows to search for wireless access points in my travels. This month I gave a Linux-based alternative a spin. AirTraf is a basic site survey tool that looks for 802.11b access points and displays traffic . . .
FreeS/WAN 2.01 has shipped and is available as both source and binary RPM's. This is an important release for anyone using Opportunistic Encryption (OE) as there is a small but serious change to the OE protocol. For now the protocol is . . .
On Tuesday the organization responsible for the Bluetooth wireless standard unveiled version 1.2 of its official spec at the Bluetooth World Congress in Amsterdam. But for real evidence that that the technology is finally gaining acceptance turn to the conference program . . .