Vendors/Products - Page 41
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.
This open source company attempts to bring their open source IDS solutions to the table. The article provides a personal insight into the beginnings and directions of the project, bringing out an interesting point of the catch-22 of open source projects: no community -> no credibility -> no community. Sure one of the biggest concerns with the IDS are false positives - however, which IDS doesn't have that concern? Why not check out the article and see if you would want to contribute to the community there. Better yet, do you have any ideas of how to get out of the catch-22?
Those of you familiar with CSI (or have surely heard of it) are all too familiar with the process they use to catch the criminals - scientific analysis, forensics, gadgetry, and smarmy head investigators. Reoccurring themes include DNA analysis or other types of human-related evidence. However, in the information world, catching a criminal after the crime is in another league of its own. This article presents an account of a recent DefCon presentation which focused on breaking the actual forensics software used to analyze compromised systems. The most interesting line in the article referred to the weaknesses in one of the most popular forensics tools - "Most of these can and will be fixed in the near future, but at least one is a design flaw, not a bug.". Read on to find out how your forensics tools are only as good as the makers of them, and how it can result in a perfect getaway.
Better scripting languages calls for better automation which results in better automated exploit tools. Security firm Immunity has its own tool that automates the creation of attack code, supposedly cutting the development time in half. Unveiled at DefCon, this tool has made its rounds at the conference and sparked a buzz with its emphasis on capitalizing on zero-day flaws, making sure exploits can be developed as soon as possible.
A site for reviews and Linux, Piotr over at Polishlinux.org took a chance to review EnGarde Community for servers. A nice, quick overview of install, configuration, and how to test EnGarde from one computer. The site itself is a great resource for understanding how to compare, assess and choose the best distribution for you. SO make sure to check out their Distro chooser,a great little quiz that takes your preferences and recommends the best distro based on your answers. A nice resource as well. Check it out!
Let's just imagine for once that you ARE a Photoshop wizard or some other GUI intensive app expert. Better yet, you're the sysadmin responsible for all those Microsoft Word / Photoshop heavy desktops on your network. One day your boss asks you "What happens if the building is closed due to bad weather / construction / St. Patrick's Day Parade? Can we enable remote access for our web design whiz kids?" With the recent release of Xandros Server 2.0, this is all possible. "The companies claim that this extended Xandros-NoMachine alliance provides enhanced capabilities for secure and rapid access to graphical applications, running on any operating system across any network connection." Tell the whiz kid's who somehow "can't make it into work" that she could now work from home effeciently, utilizing her broadband connection to connect to the Xandros Server rather than connecting to deviantArt.
I'm a big fan of virtualization software. The main benefits come from having a pristine duplicate testing environment in every case, ease of portability, as well as (lack of?) hardware costs. These are essential features in anyone's network analysis toolbox and helps to expose any vulnerabilities in architecture. Read on for some interesting virtualization schemes for Cisco routers and Linux networks and start hammering away at your "what if?"s rather than theorizing them.
"The security chiefs of several large infrastructure and software vendors said they are doing all they can do to embed security into their products, but they agreed that more work must be done to improve security between their platforms." How well does the open source community spread security issues? Does Redhat and Novel work together to improve security? One of the best ways to improve security is to have all players share their patches to fix vulnerabilities fast.
How secure is Linux? It is so secure it is now being used to protect Microsoft Windows. Adrian Kingsley-Hughes gives a first hand review of the 'Yoggie Pico Pro'. The Yoggie, no relation to a the baseball player, is an embedded computer the size of a USB drive that plugs right into a computer USB port. The little gadget then allows the user to run 13 security applications that won't bog down his normal computing experience. Its a must have for any one that has a laptop and likes to plug into public networks.
Just one day after a security researcher showed how Google's Firefox toolbar could be exploited in an online attack, a similar flaw has been discovered in the Google Desktop.
Makers of some of the most popular extension software used by the Firefox browser are not doing enough to secure their software, a security researcher said Wednesday.
BackTrack is a live CD Linux distribution that focuses on penetration testing. A merger of two older security-related distros -- Whax and Auditor Security Collection -- BackTrack bundles more than 300 security tools.
It turns out that, after years of engineering work and collaboration efforts with strategic partners such as IBM, Red Hat's March 14 release of Red Hat Enterprise Linux 5 had the misfortune of coinciding with the company's release of a whopping 11 security advisories.
Starting to get worried about the exposure of those thousands of virtual servers in your data center? The bad news is no one knows for sure what security threats lurk in the virtual world. The good news is, security tools are finally starting to emerge.
Remote-Exploit has announced the release of BackTrack 2.0, SLAX-based live CD with a comprehensive collection of security and forensics tools: After many months of work, we're finally happy enough with BackTrack to call it v.2.0 Final.
App security vendor Watchfire and anti-malware vendor Panda Software both launched web-based apps this week. Watchfire's new release, Appscan Enterprise 5, checks source code under development for security problems. The latest version includes a new
Software companies should be made liable for the security problems that arise in their products, according to security guru Bruce Schneier. In a presentation at the LinuxWorld OpenSolutions Summit, the BT Counterpane CEO said that this was the only way to help improve IT security, the effects of which were currently taken for granted.
Online criminals today know what they want, and they know where to find it: in your corporate database. Yet, despite a number of highly-publicized data breaches and thefts, many enterprises still have not fully developed a database security strategy. Experts agree that database information particularly customer lists and personal user data is currently the most marketable and attractive target for electronic thieves. But most databases aren't ready for the onslaught of attacks they are beginning to see, the experts warn.
In October 2005, Windows expert Mark Russinovich broke the news about a truly underhanded copy-protection technology that had gone horribly wrong. Certain Sony Music CDs came with a program that silently loaded itself onto your PC when you inserted the disc into a CD-ROM drive. Extended Copy Protection (or XCP, as it was called) stymied attempts to rip the disc by injecting a rootkit into Windows
A few months back I did some intense testing of all the best vulnerability scanners out there