Help Net Security
Sophos Delivers Mailmonitor For SMTP
Sophos, a world leader in corporate anti-virus protection, today announced the availability of Sophos MailMonitor for SMTP to detect, report and disinfect viruses in email …
TruSecure One of Fastest Growing Tech Companies
Attributes Successful Information Security Health Check Business Model to 497% Revenue Growth HERNDON, Va.- November 5, 2001- TruSecureÒ Corporation, a Managed Security …
GFI Offers Free LANguard Security Event Log Monitor
GFI OFFERS FREE COPY OF LANGUARD SECURITY EVENT LOG MONITOR (S.E.L.M.): Intrusion detection using the Windows NT/2000 security event logs London, UK, 5 November 2001 – …
Kaspersky Labs Partners with ITamigo and Join Efforts in the U.S. Market
Kaspersky Labs and ITamigo Provide Customers with the First Kaspersky Anti-Virus Based Email and Desktop Virus Protection Appliance Available in the U.S. Marketplace. …
CIMCOR, INC Rated one of The Top 50 Diversity owned Businesses in Indiana
October 18, 2001/Southport, CT Div2000.com/The States leading Diversity owned businesses were recently announced at the National Diversity awards ceremony in Washington, DC. …
Evidian announces PortalXpert 3.0
With new PortalXpert Web security software, Evidian demonstrates an unparalled capability for handling plug and play Access Control and SSO for all web applications. According …
Powerpuff Girls DVD Struck Down By Funlove
Sophos has learnt that a DVD from Warner Bros featuring new cartoon stars, the Powerpuff Girls, is infected by the FunLove virus. If the disc – called ‘Meet the …
F-Secure warns about Nimda.E network worm
F-Secure Corporation (HEX:FSC) is alerting computer users worldwide about a new version of the infamous Nimda worm. Nimda.E has been modified probably by the original author …
Sophos- Virus Top Ten for October 2001
This is the latest in a series of monthly charts counting down the ten most frequently occurring viruses as compiled by Sophos, a world leader in corporate anti-virus …
Console IOCTLs Under Linux
Console IOCTLs can be very useful and powerful. These are the IOCTls that involve the console. They are the user interface to manipulation of the console. I am going to go …
Which hat are you?
It was inevitable that the hacking scene be split into new sub categories with new terminology to represent the mentality of the world’s brightest hackers. A decade ago …
How can you spot a Hacker?
What defines a Hacker? What motivates a Hacker? A majority of people seem to have a vague understanding of what being a Hacker is all about. Is there an underground Hacker …
Featured news
Sponsored
Don't miss
- Meta introduces default end-to-end encryption for Messenger and Facebook
- New RCE vulnerability in Apache Struts 2 fixed, upgrade ASAP (CVE-2023-50164)
- December 2023 Patch Tuesday forecast: ‘Tis the season for vigilance
- Aim for a modern data security approach
- Short-term AWS access tokens allow attackers to linger for a longer while