Vendors/Products - Page 66
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
As standards wars rage on in 802.11 wireless local-area networks, the Proxim Harmony 802.11a card shows the promise of a cost-effective wireless bandwidth adequate for video and data by cranking up wireless data rates to a theoretical 54 Mbits/second and beyond, . . .
UPDATE: Karl-Heinz Zimmer requested that I more accurately portray the situation. Since I don't believe that I can say it any better than he can, I have enclosed his email to me at the bottom of the . . .
In response to increasingly militant attacks carried out by hackers, system administrators across the spectrum of IT have worked diligently in recent months to remove telltale signs that can classify their Web servers. However, this may fashion a false sense of confidence. . .
It's depressing for security professionals to see just how many of the vulnerabilities on the new SANS/FBI Top 20 List have CVE numbers in the 1999-xxxx range -- meaning that they were identified and fixed years ago on some systems. Newer . . .
For those who don't know yet, Openwall GNU/*/Linux (or Owl) is a security-enhanced operating system with Linux and GNU software as its core, intended as a server platform. And, of course, it's free. More detailed information is available on the web site. . .
Intel plans to announce a new network processor on Tuesday that will handle security functions, a move it expects will reduce the cost and improve the performance of networking equipment. The company will also delay a similar product that does not offer security features.. . .
The latest flaw with a major Microsoft product shows Redmond is unlikely to have anything that approximates to secure software until 2004 at the earliest. That's the damning assessment of analysts Gartner in response to a serious, but little publicised, vulnerability . . .
Kevin Jurrens writes: Prentice Hall PTR and HP Books today announced the publication of "Halting the Hacker: A Practical Guide to Computer Security," Second Edition by Donald L. Pipkin, CISSP, Information Security Architect for the Internet Security Division of the Hewlett-Packard Company. "Halting the Hacker: A Practical Guide to Computer Security," Second Edition, combines unique insight into the mind of the hacker with practical, step-by-step countermeasures for protecting any HP-UX, Linux, or UNIX system.. . .
Guardian Digital, Inc., the leading open source security company, has today formerly launched the EnGarde Secure Linux server operating system, EnGarde Secure Professional. EnGarde Secure Professional is a comprehensive enterprise software solution that provides all the tools necessary to build a complete, secure online presence. This provides organizations with a cost-effective and proven platform capable of supporting thousands of Web sites and e-mail domains.. . .
What happens when journalists find themselves reporting the legal and personal risks associated with Microsoft's Passport can be easily avoided by adopting better technology from the open-source world? The normal legal standard for judging the adequacy of professional services -- such . . .
The Apache/MOD_SSL, or "Slapper" worm that is fast infecting Web servers worldwide marks a new milestone in the evolution of computer worms, experts say: the creation of a peer-to-peer network by a worm for the purpose of conducting distributed denial of . . .
A new worm that attacks Linux Web servers has compromised more than 3,500 machines, creating a rogue peer-to-peer network that has been used to attack other computers with a flood of data, security experts said Saturday. The worm seems to . . .
The recent release of Stunnel version 4.00 picks up where previous versions left off by improving encryptions capabilities and simplifying installation and configuration. Late last week, the newest version of Stunnel[1], the secure SSL wrapper, was released. Stunnel encapsulates cleartext protocols . . .
Launching its own initiative to thwart hackers, Intel Corp. on Monday unveiled a new security initiative, code-named LaGrande Technology, that it will integrate into future processors and chip sets to stymie efforts to steal data. While many computer users rely . . .
Securing wireless LANs isn't easy. Just ask any network manager who has the task of adding another way to authenticate users to yet another networked device. Funk Software Inc. this week is expected to reveal enhanced versions of its Odyssey Server and Steel-Belted Radius Enterprise Edition wireless authentication applications.. . .
Security researchers have discovered two potentially serious flaws with Check Point's flagship FireWall-1 firewall which give rise to both username guessing and sniffing issues. First, affected versions permit attackers to determine if a firewall username is valid without having to . . .
Although this problem doesn't affect UNIX and Linux variants, it does apply to more than just Microsoft Windows platforms. You should check it out even if you are running NetWare or OS/2 (both of which are definitely vulnerable) or any other . . .
"It used to be enough just to patch security problems, apologize and get on with business. But this case shows that (regulators) are now watching, and if you get burned, you may have a lawsuit on your hands," said Greg Shipley, chief technology officer of Neohapsis, a Chicago-based information security company that assisted the New York authorities on the case.. . .
The U.S. National Security Agency's contribution to open-source security, Security-Enhanced Linux, found broad approval and support in geek forums from Wired News to Slashdot that are typically suspicious of the government. . .
Although many Linux/UNIX diehards disagree, many, if not most system administrators nowadays are more comfortable working with a GUI, and therefore more favorably disposed towards an OS with one. But a problem with GUIs is that when they are running, but . . .