Vendors/Products - Page 73

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Turnkey Linux package eases VPN installation

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Network professionals will be able to more easily set up and configure Linux-based VPNs in branch offices with software, services and hardware from OpenReach and Penguin Computing. OpenReach and Penguin announced last week a turnkey Linux VPN package consisting of OpenReach . . .

Trend Micro offers virus protection for Linux

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Newest editions of InterScan VirusWall and eManager for Linux platforms guard against viruses, trojans, hacker agents and other unwanted content. NEW ORLEANS - Trend Micro Inc. will soon be able to offer gateway virus protection to the burgeoning community of open-source . . .

A sharp eye for security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Companies that believe their networks can be completely protected by a phalanx of add-on security products may be in for a rude awakening. Underlying vulnerabilities, embedded and unseen many layers down in network infrastructures, may be unwitting invitations to even moderately . . .

Ssh! Don't use that trademark

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

For security-conscious system administrators, three letters have become a household word when it comes to securing remote computers: SSH. SSH, which is derived from the term "secure shell," is a set of standards for encrypting the commands and data sent . . .

lcrzo and lcrzoex Version 3.03

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Lcrzo is a network library. Its main objective is to easily create network test programs. This library provides network functionnalities for Ethernet, IP, UDP, TCP, ICMP, ARP and RARP protocols. It supports spoofing, sniffing, client and server creation. Furthermore, lcrzo contains . . .

Microsoft Obsecurity

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This is a parody of the new internet server announced by Microsoft, Obsecurity. "This page contains answers to questions about Microsoft Obsecurity general issues. If the questions and answers below do not address your specific concern, please go to Knowledge Base . . .

Microsoft launches first security product

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Microsoft on Wednesday released what it bills as its first security software, a firewall and Web cache product. Internet Security and Acceleration (ISA) Server is the security and performance arm of Microsoft's .NET enterprise servers, the company said in a release. . . .

Intel adds security to file-swapping

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Intel is attempting to add security to the file-swapping technology made popular by music-sharing service Napster, by publishing an open source library of tools. Called the Peer-to-Peer Trusted Library, the tools enable application developers to add trusted elements such . . .

Wireless Security Flawed, Researchers Report

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Wireless devices, including laptop computers and PDAs that are widely used to access company networks, rely on a protocol that has "major security flaws" and are vulnerable to hackers using equipment they can obtain easily, a research group at the University . . .

Your Opinion: "Most Secure OS"

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recently we held a promotion for "The FreeBSD Corporate Networker's Guide" and it was the perfect opportunity to ask our visitors to share some thoughts, and, receive a free copy of the book. The question we asked was: "Whick OS do . . .

The Beta version of Mandrake Security is available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

MandrakeSoft is pleased to announce the beta version of Mandrake Security, based on Linux-Mandrake 7.2, released in alpha version on 28 december 2000. Its significant improvements are: functional web interface, possibility of configurating the firewall part via the web,correction of bugs. . . .

ISC Institutes Fee-based Membership Plan

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Recently on a posting forwarded to bugtraq by Theo de Raadt, Paul Vixie, Chairman of the ISC, describes the need for a fee-based program to notify BIND vendor's, TLD operators, and others under a non-disclosure plan to publish security and bug information to priority members. Theo thinks this is detrimental to the development of BIND. . .

Security standard creates new risks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Computer users face an increased risk from the transmission of viruses in encrypted form, following the launch of a security initiative today. The Trusted Computing Platform Alliance, which is backed by major companies such as Microsoft, Hewlett-Packard and Compaq, has . . .

UUNet falls foul of RIP Act

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

UUNet has a special place in our heart after our most recent service interruption. "UUNet last week became the first internet service provider (ISP) to fall foul of tough new laws on intercepting emails. Network News understands that the breach of the controversial Regulation of Investigatory Powers (RIP) Act happened when UUNet, the UK's second largest UK ISP and one of the biggest suppliers of leased lines, dealt with a spam attack. Engineers clearing more than two million emails called up all the messages and examined the headers to delete the spam. Examining the subject line of the header, however, contravenes the data interception rules specified by the RIP Act which were designed to give users a guarantee of privacy. . . .