Saturday, March 8th, 2008
Imagine visiting a blog on a social site or checking your email on a portal like Yahoo's Webmail. While you are reading the Web page, JavaScript code is downloaded and executed by your Web browser. It scans your entire home network, detects and determines your Linksys router model number, and ...
Posted in Internet, Security | No Comments
Saturday, March 8th, 2008
Which operating system, embedded in more than 80% of enterprise IT environments, represents one of the fastest-growing hacker targets and potentially the most-devastating information-security vulnerability? Hint: It ain't Windows. Cisco Systems' Internetwork Operating System now sits at the center of the information security vortex. Because IOS controls the routers that ...
Posted in Hardware, Security | No Comments
Saturday, March 8th, 2008
Cisco's Linksys WRT54G Wireless-G Broadband Router has a flaw that could allow an attacker to gain administrative privileges on vulnerable devices. Even if the remote administration feature on the device is turned off, the router serves the administration web page on ports 80 and 443, protected only by a weak ...
Posted in Security | No Comments
Saturday, March 8th, 2008
VPN just got easier. Windows 2000 and XP clients can do IPSec out of the box, but when you attempt to VPN to an external resource from behind a NAT router/firewall, challenges ensue. To date, Microsoft has not gotten along well with NAT, but in a brand new update made ...
Posted in Windows | No Comments
Page 10 of 10« First«...678910