Please turn on your JavaScript for this page to function normally.
Wireless LAN Security

Although a variety of wireless network technologies have or will soon reach the general business market, wireless LANs based on the 802.11 standard are the most likely …

Security Enhanced Linux BETA Available

A fully functioning distribution of Security Enhanced Linux is now available in BETA for community and industry evaluation. The three-CD set is available here. The shipping …

“Untangling Web Services Security” web seminar

On Wednesday, November 20 2002, RSA Security will host a web seminar titled “Untangling Web Services Security”. RSA Security Technical Director of Developer …

The danger of PDAs

PDAs (personal digital assistants), pocket-sized diaries that are becoming increasingly more powerful, can represent a serious threat to corporate security. As PDAs become …

Snort Enterprise Implementation

The purpose of this guide is to document the installation and configuration of a complete Snort enterprise implementation. This guide contains all the necessary information …

Microsoft releases IIS, Windows XP and Windows 2000 security patches

In yet another combo pack, Microsoft released three security bulletins. The bulletins which are labeled from moderate to critical, deal with Internet Information Service …

ActivCard Launches ActivCard Gold 2.2

ActivCard, the leader in IDentity Management software, announced the worldwide availability of ActivCard Gold 2.2 and ActivCard Gold for CAC 2.2, enabling enterprises and U.S. …

Implementing secure web portals with RSA ClearTrust webinar

On Wednesday, November 06 2002, RSA Security and Geisinger Health System will host a web seminar titled “Implementing Secure Web Portals with the RSA ClearTrust …

Network Associates Fights Spam

The McAfee Security division of Network Associates, Inc. announced a new initiative to combat spam through increased education, awareness, and technology, expanding upon the …

The IP Smart Spoofing

This paper describes a new technique for spoofing an IP address with any networking application. IP spoofing is not new and various hacking tools have been developed to …

Check Point VPN-1/FireWall-1 added to Computer History Museum

Check Point VPN-1/FireWall-1 was presented to the Computer History Museum during a recent visit to the museum by Check Point’s executives. Established in 1996, the …

No more security patches for SuSE Linux 7.0

SuSE announced today on their suse-security-announce mailing list, that with the release of SuSE Linux 8.1 i386 (ftp available version), SuSE Linux 7.0 will be discontinued. …

Don't miss

Cybersecurity news