Search results for: software

SSH Demonstrates Quicksec Toolkit Integration With Montavista Linux

Combination Enables Enhanced Network Security in Embedded Applications SECUTECH TAIPEI, TAIPEI WORLD TRADE CENTER TAIWAN; HELSINKI, FINLAND; PALO ALTO, Calif. and TOKYO – April 7, 2003 – SSH Communications Security (HEX:SSH1V), a world-leading developer of Internet security solutions, today announced that it has demonstrated the SSH QuickSec(TM) Toolkit with MontaVista(TM) Linux®. The SSH QuickSec Toolkit Family is specifically designed to let network device developers and OEMs quickly and easily implement IPSec (Internet Protocol Security) functionality. … More

SSH Demonstrates QuickSec Toolkit Integration With MontaVista Linux

The SSH QuickSec Toolkit Family is specifically designed to let network device developers and OEMs quickly and easily implement IPSec functionality. Optimized and validated for use with MontaVista Linux, the SSH QuickSec Toolkit provides industry-leading cost, performance and time to market advantages for incorporating security, such as VPN and firewall functionality, in IP communication devices. MontaVista Linux is the industry-leading Linux operating system for embedded environments. It provides a common platform across a broad range … More

Iraq Dragged Into The Infamous 419 Scam

Scammers are not just persistent and shameless, but they are opportunistic as well, therefore it is only logical that they would now try to profit from the plight of Iraqis caught in a war. Many people know the 419 Scam (named after the Section Number of Nigerian criminal law that applies to it) as simply the “Nigerian Scam”. The ruse appears in many variations but the basic premise remains constant; con artists mass email a … More

SecureInfo Corporation Provides Critical Information Security Assistance to Coalition Forces in Preparation for Deployment of Operation Iraqi Freedom

InSite Team Delivers Information Assurance Solutions to Measure and Mitigate Cyber Security Risks SAN ANTONIO, April 7, 2003 — SecureInfo Corporation today announced that its InSiteSM security consulting team had completed comprehensive network security Certification and Accreditation solutions for the Combined Air Operations Center (CAOC) prior to the full-scale deployment of forces in conjunction with Operation Iraqi Freedom. The security Certification and Accreditation process is an information assurance methodology currently utilized by all commands within … More

Datakey and Precise Biometrics Sign License Agreement

Datakey integrates Precise Match-on-Cardâ„? fingerprint technology with its client software and smart card solutions MINNEAPOLIS, April 3, 2003 – Datakey Inc. (Nasdaq: DKEY; www.datakey.com), a leading developer of smart card solutions that simplify access and identity management, and Precise Biometrics AB (publ), developer and provider of world leading and user-friendly biometric security solutions based on fingerprints, today announced that Datakey has signed a license agreement with Precise Biometrics for its Precise BioMatchâ„? Pro and Precise … More

Interview with John Chirillo, author of “Hack Attacks Testing: How to Conduct Your Own Security Audit”

Who is John Chirillo? How did you gain interest in computer security? Like most computer enthusiasts I began my career early on. At twelve years old I wrote a game entitled Dragon’s Tomb. This program was published for the Color Computer (COCO) System market. During the next five years I wrote several other software packages including, The Lost Treasure (a game writing tutorial), Multimanger (an accounting, inventory and financial management software suite), Sorcery (an RPG … More

Warchalking and Other Wireless Worries

Wireless technologies promise increase flexibility but are the security risks worth the benefits? Wired computer networks are costly to install and difficult to change, wireless networks on the other hand are now cheap to install and very flexible. Wireless makes it possible connect equipment in large warehouses, retail sites and manufacturing plants without the need to install cabling. It is possible to move equipment without the need for technical assistance and, in the most extreme … More

New Apache 2.0.45 Fixes Denial of Service Vulnerability

Newly released Apache HTTP Server 2.0.45, fixes yet unspecified Denial of Service vulnerability. The vulnerability information will be disclosed by iDefense on 8 April 2003. Below you can find a partial reprint of the Apache announcement. The Apache Software Foundation and The Apache HTTP Server Project are pleased to announce the eighth public release of the Apache 2.0 HTTP Server. This Announcement notes the significant changes in 2.0.45 as compared to 2.0.44. OS2 users; note … More

Interview with Mark G. Sobell, author of “A Practical Guide to Red Hat Linux 8”

Mark G. Sobell is the author of best-selling UNIX and Linux books: “A Practical Guide to the UNIX System”, “UNIX System V: A Practical Guide”, “A Practical Guide to Linux” and “A Practical Guide to Red Hat Linux 8“. He has more than twenty years of experience working with UNIX and Linux and is president of Sobell Associates Inc., a consulting firm that designs and builds custom software applications, designs and writes documentation, and provides … More

Hong Kong Institute Of Vocational Education To Offer Diversinet’s Wireless Security Software For Student Project

Students Will Gain Hands-On Wireless Security Experience TORONTO, Canada, April 2, 2003 – Diversinet Corp. (NASDAQ SmallCap: DVNTC), a leading provider of secured mobile solutions, today announced that the Hong Kong Institute of Vocational Education, Sha Tin (IVE) has acquired Diversinet’s wireless security software for its Higher Diploma in Computer and Information Engineering course. Diversinet’s wireless security software will be used by IVE students in a final year project in the Higher Diploma in Computer … More

Panda Antivirus Appliance FAQ

The recently launched Panda Antivirus Appliance has become one of the most effective tools for protecting the network perimeter on the market. The pioneering concept of a dedicated antivirus server has generated a number of questions about the positioning and functionality of Panda Antivirus Appliance. Panda Software, leading antivirus developer, provides a series of answers to some of the most frequently asked questions about Panda Antivirus Appliance, to help explain the benefits that high performance … More