Vendors/Products - Page 71

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

The Big *BSD Interview

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This isn't a security article, but you will find it interesting. "Matt Dillon, not the famous actor but the kernel/VM FreeBSD hacker also well known for writting the Dice C compiler for the Amiga, is here with us today for . . .

IBM clamps down on wireless security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

IBM is expected to launch on Monday new services and software aimed at making wireless networks and communications more secure and widely used, the company said Sunday. IBM, based in Armonk, N.Y., said it put together a broad-based offering by its services division, Global Services, that helps companies assess, plan and implement ways to make their wireless applications and transactions more secure.. . .

MS Security Plan: OK, Kind Of

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft's newest security initiative is drawing jeers and a few cheers from industry experts. Many experts said Microsoft's Strategic Security Protection Program plan announced Wednesday is nothing more than a half-hearted attempt to assuage increasing demands from government, industry and consumers . . .

Microsoft confronts security fears

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft on Wednesday launched a major security initiative intended to address concerns that its software is prone to security problems and virus attacks. The world's largest software maker is looking to allay fears over ongoing security problems and recent worm . . .

NSA Secure Linux hits the shelves

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The National Security Agency (NSA) has released its second public version of the Security Enhanced Linux operating system. Although still in prototype, the Linux Security Modules based OS is designed to be an almost uncrackable development of the open source platform, . . .

Tool copies hackers to detect flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

New online tool uses AI to mimic hackers, but some experts question how effective it can really be. UK firm ProCheckUp has developed an online tool to expose network security flaws by using artificial intelligence (AI) to mimic the actions of a hacker. However, experts question how successful the software will be at detecting security holes.. . .

Security software: blind lead blind

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

It's incredible that in this day and age some of the most popular security products, products that are marketed as protecting you from the evils of computers, are so badly designed. CheckPoint's FireWall-1, the leading firewall by market share, had . . .

Secure the Wireless Network firmware

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Security issues surrounding wireless networking can be addressed without upgrading hardware, Intel said today. The future ubiquity of wireless networking has been a key theme of the IDF this week, with much talk of a mobile computing future where laptop . . .

HP to sell its own Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Hewlett-Packard will sell a secure version of Linux, a product that marks a departure for computer makers that traditionally have favored partnerships with companies such as Red Hat that sell Linux. HP Secure OS Software for Linux, which will be announced Wednesday, will cost about $3,000, said Roberto Medrano, general manager of HP's Internet Security division.. . .

Virus fighters form anti-DDoS alliance By Dennis Fisher

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recent threats such as the code Red and Leave worms are proof that virus writers and hackers are pooling resources to produce hybrid weapons that can cause tremendous damage. Now, a group of security companies is following suit, hoping that by combining their efforts, they'll be better able to combat the new, sophisticated attacks.. . .

GroupWise users fight mystery bug

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Just a reminder why we love open source the way we do. "Network managers who administer Novell's newest version of GroupWise are scrambling to fend off a bug that can severely compromise network security and e-mail systems. However, Novell is not telling administrators what the bug is or how to duplicate it, saying that it wants to give customers time to patch their systems before anyone can exploit the vulnerability.. . .

Wireless networks wide open

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A new way to attack wireless networks underscores the lack of security for PC owners using the airwaves to connect their computers, said security experts speaking at the Black Hat Briefings conference. On Thursday, Tim Newsham, a researcher for security . . .

Cisco patches security flaws

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A major vulnerability affects IOS software, enabling a hacker to bypass the authentication function. Cisco has issued an advisory document that tells IT managers how to eliminate several security flaws in its IOS software. The most serious vulnerability affects all versions . . .

The e-smith server and gateway

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"Have you got an old 486 lying around somewhere?" That's a question I've asked on a number of occasions when offering to set up an inexpensive Internet gateway, mail server and firewall solution. Sometimes, the server also serves up web pages. . . .

Security Vendor Overpayment Widespread

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Are you overpaying for networking equipment? Gartner Inc. reports that many Fortune 500 companies are overpaying an average of $500,000 per year by failing to take active steps to cut their costs. The key, Gartner says, is using negotiating best . . .

The Future of NetSaint: Legal Woes

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

NetSaint, the network monitoring tool, is apparently having legal problems over the use of the name netsaint. Ethan will be halting development for the time being, while he reorganizes. "Most of you are probably aware of the recent legal mess I'm found myself in over the use of the name "NetSaint".. . .