Monday, May 19th, 2008
Five former Cisco engineers have co-founded a start-up called Rohati Systems whose products take dead aim at traditional perimeter firewalls.
A traditional firewall and its access control lists "is not capable of doing its job today from an access-control perspective," says CEO and President Shane Buckley. "Nowadays, your ...
Posted in Hardware, Internet, Privacy, Security, Software | No Comments
Wednesday, May 14th, 2008
The Ubuntu Unleashed blog has an excellent guide to the ins and outs of the Uncomplicated Firewall (ufw), a new feature in Ubuntu Linux 8.04, or Hardy Heron, that makes it easy to control the traffic into and out of your system. While turning on the firewall is as simple ...
Posted in Internet, Linux, Privacy, Security | No Comments
Wednesday, May 14th, 2008
Most of todays tools for fingerprinting are focusing on server-side services. Well-known and widely-accepted implementations of such utilities are available for http web services, smtp mail server, ftp servers and even telnet daemons. Of course, many attack scenarios are focusing on server-side attacks.
Client-based attacks, especially targeting web clients, are becoming ...
Posted in Internet, Privacy, Security, Software | No Comments
Monday, May 12th, 2008
ZoneAlarm ForceField provides a protective layer around your browser, shielding you from drive-by downloads, browser exploits, phishing attempts, spyware and keyloggers. So your passwords, your confidential information, and your financial data remain protected.
While traditional security, such as firewalls, antivirus, and security suites, protects your PC, ZoneAlarm ForceField protects your browser ...
Posted in Internet, Privacy, Security | No Comments
Monday, May 12th, 2008
For years, organizations have focused on the evil outsiders that were behind attacks on their networks. Firewalls, IDS, IPS technologies have come to the rescue and have resulted in impregnable walls protecting organization networks. Now with strong walls, the challenge is ensuring the trusted insiders don't walk out with the ...
Posted in Hardware, Networking, Privacy, Security | No Comments
Page 5 of 10« First«...34567...10...»Last »