Vendors/Products - Page 41

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

RenaissanceCore IDS Seeks to take Intrusion Detection to the Next Level

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

This open source company attempts to bring their open source IDS solutions to the table. The article provides a personal insight into the beginnings and directions of the project, bringing out an interesting point of the catch-22 of open source projects: no community -> no credibility -> no community. Sure one of the biggest concerns with the IDS are false positives - however, which IDS doesn't have that concern? Why not check out the article and see if you would want to contribute to the community there. Better yet, do you have any ideas of how to get out of the catch-22?

How to Break Forensics Software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Those of you familiar with CSI (or have surely heard of it) are all too familiar with the process they use to catch the criminals - scientific analysis, forensics, gadgetry, and smarmy head investigators. Reoccurring themes include DNA analysis or other types of human-related evidence. However, in the information world, catching a criminal after the crime is in another league of its own. This article presents an account of a recent DefCon presentation which focused on breaking the actual forensics software used to analyze compromised systems. The most interesting line in the article referred to the weaknesses in one of the most popular forensics tools - "Most of these can and will be fixed in the near future, but at least one is a design flaw, not a bug.". Read on to find out how your forensics tools are only as good as the makers of them, and how it can result in a perfect getaway.

Security Firm Automates Generating Attack Code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Better scripting languages calls for better automation which results in better automated exploit tools. Security firm Immunity has its own tool that automates the creation of attack code, supposedly cutting the development time in half. Unveiled at DefCon, this tool has made its rounds at the conference and sparked a buzz with its emphasis on capitalizing on zero-day flaws, making sure exploits can be developed as soon as possible.

Quick Review: EnGarde

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A site for reviews and Linux, Piotr over at Polishlinux.org took a chance to review EnGarde Community for servers. A nice, quick overview of install, configuration, and how to test EnGarde from one computer. The site itself is a great resource for understanding how to compare, assess and choose the best distribution for you. SO make sure to check out their Distro chooser,a great little quiz that takes your preferences and recommends the best distro based on your answers. A nice resource as well. Check it out!

Xandros Bundles NoMachine Thin-Client Server

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Let's just imagine for once that you ARE a Photoshop wizard or some other GUI intensive app expert. Better yet, you're the sysadmin responsible for all those Microsoft Word / Photoshop heavy desktops on your network. One day your boss asks you "What happens if the building is closed due to bad weather / construction / St. Patrick's Day Parade? Can we enable remote access for our web design whiz kids?" With the recent release of Xandros Server 2.0, this is all possible. "The companies claim that this extended Xandros-NoMachine alliance provides enhanced capabilities for secure and rapid access to graphical applications, running on any operating system across any network connection." Tell the whiz kid's who somehow "can't make it into work" that she could now work from home effeciently, utilizing her broadband connection to connect to the Xandros Server rather than connecting to deviantArt.

Simulating Cisco and Linux Networks

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

I'm a big fan of virtualization software. The main benefits come from having a pristine duplicate testing environment in every case, ease of portability, as well as (lack of?) hardware costs. These are essential features in anyone's network analysis toolbox and helps to expose any vulnerabilities in architecture. Read on for some interesting virtualization schemes for Cisco routers and Linux networks and start hammering away at your "what if?"s rather than theorizing them.

Vendors Admit More Cooperation Needed on Security

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

"The security chiefs of several large infrastructure and software vendors said they are doing all they can do to embed security into their products, but they agreed that more work must be done to improve security between their platforms." How well does the open source community spread security issues? Does Redhat and Novel work together to improve security? One of the best ways to improve security is to have all players share their patches to fix vulnerabilities fast.

Now Window's Users can benefit from Linux Security Applications

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

How secure is Linux? It is so secure it is now being used to protect Microsoft Windows. Adrian Kingsley-Hughes gives a first hand review of the 'Yoggie Pico Pro'. The Yoggie, no relation to a the baseball player, is an embedded computer the size of a USB drive that plugs right into a computer USB port. The little gadget then allows the user to run 13 security applications that won't bog down his normal computing experience. Its a must have for any one that has a laptop and likes to plug into public networks.

New Tool: Virtual Tip of the Iceberg

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Starting to get worried about the exposure of those thousands of virtual servers in your data center? The bad news is no one knows for sure what security threats lurk in the virtual world. The good news is, security tools are finally starting to emerge.

BackTrack2 Final Now Available

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Remote-Exploit has announced the release of BackTrack 2.0, SLAX-based live CD with a comprehensive collection of security and forensics tools: After many months of work, we're finally happy enough with BackTrack to call it v.2.0 Final.

Make Vendors Liable for Flaws, Says Schneier

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Software companies should be made liable for the security problems that arise in their products, according to security guru Bruce Schneier. In a presentation at the LinuxWorld OpenSolutions Summit, the BT Counterpane CEO said that this was the only way to help improve IT security, the effects of which were currently taken for granted.

Vendors Prep for Database Security War

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Online criminals today know what they want, and they know where to find it: in your corporate database. Yet, despite a number of highly-publicized data breaches and thefts, many enterprises still have not fully developed a database security strategy. Experts agree that database information particularly customer lists and personal user data is currently the most marketable and attractive target for electronic thieves. But most databases aren't ready for the onslaught of attacks they are beginning to see, the experts warn.

Review: Six Rootkit Detectors Protect Your System

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In October 2005, Windows expert Mark Russinovich broke the news about a truly underhanded copy-protection technology that had gone horribly wrong. Certain Sony Music CDs came with a program that silently loaded itself onto your PC when you inserted the disc into a CD-ROM drive. Extended Copy Protection (or XCP, as it was called) stymied attempts to rip the disc by injecting a rootkit into Windows