Vendors/Products - Page 48

We have thousands of posts on a wide variety of open source and security topics, conveniently organized for searching or just browsing.

Discover Vendors/Products News

Sun To Open-Source Web Authentication, Single Sign-On

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sun Microsystems plans to open-source its Web site authentication and single sign-on technology. Eric Leach, director of product management at Sun, said the Santa Clara, Calif.-based company will open-source the technology through the Open Source Web Single Sign-On, or OpenSSO project. That effort includes technology related to authentication, single domain, single sign-on, Web agents and J2EE agents, he said.

VeriSign Buys iDefense For $40m

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

John Leyden from The Register writes: "Net infrastructure firm VeriSign has bought security intelligence firm iDefense for $40m in cash. iDefense's 45 employees will join VeriSign in a move designed to bolster its managed security services offering with proactive threat warning and security remediation advice."

Debian addresses security concerns

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Popular Linux distributor Debian has moved quickly to address concerns it was falling behind on security. The organisation's security team has issued a host of announcements and informed the community it has resolved problems with the infrastructure governing security updates.

Adobe Warns of Security Flaw to Software

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A security flaw in the popular document-sharing software, Adobe Reader, could be exploited to seize control of a computer system, according to the software's maker. Adobe Systems Inc. issued a warning on its Web site Tuesday saying that the flaw affects only the Adobe Reader versions 5.0.9, 5.0.10, which were written for the Unix computer operating system.

Interview with Gaël Duval of Mandriva (ex MandrakeSoft)

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Well... I'm 32 years old, and it's been nearly 7 years since I launched the first Mandrake Linux distribution - so my professional life has been totally focusing on Mandrkesoft/Mandriva for 7 years! I started as a technical director for the distribution, then I retired a bit in 2000/2001 by just focusing on our community website. Then I started to manage all the communication of Mandriva. And it's possible that I will soon stop that and focus on something else. At the same time, I always had a look at our products, sent suggestions, launched new projects such as the redesign of our desktop and the MandrakeMove concept, our very own liveCD. My spare time mostly consists of spending time with my wife and my little daughter, who was born 4 months ago! I also spend a little time recording music, which was my big hobby for years. Read At TuxJournal.net

Java flaws open door to hackers

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Sun Microsystems has fixed a pair of security bugs in Java that could be exploited by attackers to take over computers running Windows, Linux and Solaris. The flaws are "highly critical," security monitoring company Secunia said in an advisory posted Tuesday. Flaws that get that ranking--one notch below Secunia's most severe "extremely critical" rating--are typically remotely exploitable and can lead to full system compromise.

A good morning with: Theo de Raadt

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Everybody know that you're the OpenBSD and OpenSSH GURU and creator, one of most famous and used secure operating system nowaday. Why you created them? What did you need many years ago from os world when you created OpenBSD? What inspired you to write from scratch OpenBSD and OpenSSH? Read Full Text

Review: FreeBSD 5.4

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

One of the oldest Unix-like operating systems, FreeBSD, continues its advancement with the sixth release in the FreeBSD-5 series. Its developers have added nothing major, but have made many modifications, fixing a number of problems introduced in previous releases. FreeBSD 5.4 is the best release since 5.1, but it still may not be ready for prime time.

Microsoft to buy Red Hat? Say it ain’t so

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

In Paris, Ontario, there’s a large plaza sign advertising both The Paris Sleep Laboratory and the Canadian Post Office. The synergy there, of course, should be obvious –at least from the point of view of the humorist. Recent revivals of the idea that Microsoft might want to take over Red Hat have a similar quality to them.

What is Cisco doing with Linux?

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

While networking giant Cisco has advantages most competitors don't - dominant market share, a multi-billion-dollar R&D budget, thousands of engineers - the vendor is also taking advantage and making the most of resources that are open to everyone: Linux and open source software.

Novell snaps up Linux security company

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Linux vendor Novell Inc. has acquired Immunix Inc., a security software vendor in Portland, Ore. The 15-person company was bought last week, but terms of the deal aren't being released, according to Novell. Immunix was founded in 1998, in part with money from the Defense Advanced Research Projects Agency, to develop security software for Linux. It's best known for developing much of the Linux Security Modules software that's used in the Linux 2.6 kernel, a key component of the Linux operating system.

BlueCat Networks Previews its Proteus Enterprise IP Address Management

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Networks, Inc., a leading provider of simple, secure and affordable network security appliances, today announced that it is previewing Proteus, its new enterprise class Internet protocol (IP) Address Management (IPAM) system at Networld+Interop in booth # 1124. Proteus, the first dedicated IPAM appliance of its kind, is a self-managed, turnkey design and management tool created to help enterprises design, deploy and manage their IP-based networks. Its unique design combines the features of an enterprise class IPAM software application with the security and manageability of a network appliance.

Software firm settles GPL violation lawsuit

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

The UK subsidiary of security software firm Fortinet has settled an action brought against it because it was allegedly not complying with the terms of the General Public Licence (GPL), which underpins the distribution of most open source software. Harald Welte, founder of the gpl-violations.org project, announced earlier this month that a German District Court had granted a preliminary injunction against Fortinet UK Ltd after the project sued, alleging that the security software firm had used GPL software in certain products and then used encryption technologies to hide the software.

PHP falls down security hole

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Servers running PHP are vulnerable to a number of serious security exploits, including some which could allow an attacker to execute malicious code, and denial-of-service exploits, according to the PHP Group. The project has issued updates fixing the bugs, available from the PHP website and directly from various operating system vendors. "All users of PHP are strongly encouraged to upgrade to this release," the PHP Group says in its advisory.

Mozilla flaws could allow attacks, data access

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Multiple vulnerabilities that could allow an attacker to install malicious code or steal personal data have been discovered in the Mozilla Suite and the Firefox open-source browser. Details of the nine flaws were published on Mozilla's security Web site over the weekend.

Fortinet in court for hiding Linux in its code

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A German court has granted a preliminary injunction against security firm Fortinet for allegedly violating the general public licence (GPL) and hiding Linux in its code. The ruling could prevent the security appliance vendor from further distributing its products until it complies with the open source licence.

Flaw found in Firefox

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

A flaw has been discovered in the popular open-source browser Firefox that could expose sensitive information stored in memory, Secunia has warned. Firefox versions 1.0.1 and 1.0.2 contain the vulnerability, the security information company said in an advisory on Monday. The flaw stems from an error in the JavaScript engine that can expose arbitrary amounts of heap memory after the end of a JavaScript string. As a result, an exploit may disclose sensitive information in the memory, Secunia said.

Red Hat patches critical hole

data:image/svg+xml,%3Csvg%20xmlns=%22http://www.w3.org/2000/svg%22%20viewBox=%220%200%20100%20100%22%3E%3C/svg%3E

Red Hat is warning enterprise Linux users to update their installations of XFree86 to fix a number of serious security bugs, some of which could allow attackers to take over a system. The affected operating systems include Enterprise Linux AS 3, Enterprise Linux ES 3 and Enterprise Linux WS 3, Red Hat said in an advisory.