Your are here:hacking technology > firewall > Article list

Home > firewall > Page 4
Proactive Security for Enterprises with EngateLabs Global Threat Analysis and DefenseHits:7
Engate Technology Corporation has announced EngateLabs , a global network threat analysis and defense center of highly skilled researchers, analysts and advanced network profiling technology that protects organizations from botnet, phish...05/06/2009
NCP engineering VPN solution combines both SSL and IPSec management with strong policy enforcementHits:6
NCP engineering GmbH has launched a comprehensive, easy-to-manage VPN solution for the UK and European market. Built to provide complete network transparency and seamless interoperability with existing infrastructure, the modular...05/06/2009
Improper risk assessment can have disastrous consequencesHits:9
With all the doom and gloom of the past few months and billions of whatever currency you like being poured into the economy I have to report on a ray of hope. I think my son may have hit on the solution completely inadvertently. He s not a...05/05/2009
Secerno and F5 Networks protect Cardif Pinnacle web-facing applicationsHits:18
Cardif Pinnacle, the UK insurance arm of banking group BNP Paribas, is one of the UK s leading providers of creditor, warranty and special risks insurance. Cardif Pinnacle will use integrated security technologies from Secerno and F5...05/05/2009
SafeBoot acquires altaVENTE mobile product rangeHits:10
SafeBoot has announced it has acquired altaVENTE s complete mobile product range, which includes its Mobile Manager and Wall Products. Terms of the deal were not disclosed. altaVENTE, a Microsoft Gold Partner based in the UK delivering...04/29/2009
Axpo enhances the effectiveness of their firewall policies with SecureTrackHits:9
With power plants in North-Eastern and Central Switzerland, the Axpo Group supplies electricity to 3 million people, requiring vast IT resources and consistent security measures to protect internal data. Axpo Group has selected Tufin s...04/29/2009
Netintelligence awarded CSIA Claims Tested MarkHits:8
Netintelligence, part of the iomart group, has been given the official government mark of approval following an in-depth review of its Enterprise Software as a service solution. The company s Ni Enterprise Manager has...04/29/2009
New Comodo Firewall Pro with Proactive Threat Defense SystemHits:11
Comodo has announced the release of Comodo Firewall Pro Version 3.0. This new release advances computer security from being a defensive, reactive system to a preventative and proactive solution based on a new A-VSMART...04/29/2009
Microsoft GDI Plugin .png Infinite Loop Denial of Service PoCHits:13
#! /usr/bin/perl #CAL_gdiplug_poc.pl # # Mircosoft_gdiplug_png_infinity_loop_D.o.S POC # by Code Audit Labs public 2009-04-17 # http://www.vulnhunt.com/ # #Affected #======== #test on full updated winxp sp3 #other version should be...04/27/2009
Tufin Technologies' channel partner program grows rapidly to over fifty security-focused channel parHits:14
Tufin Technologies has announced its channel partner program has grown to over fifty leading, security-focused channel partners in its first six months. The rapid adoption of Tufin s SecureTrack solution by the channel reflects...04/27/2009
Engate Enhances Anti-Spam Global Partner Program to Deliver Incremental Value to Hardware and SoftwaHits:8
Engate Technology Corporation has announced an enhancement to its Anti-Spam Global Partner Program with a specialized OEM program designed for software and hardware vendors ranging anywhere from anti-spam software, gateways and...04/27/2009
BulletProof FTP Client 2009 (.bps) Buffer Overflow Exploit (SEH)Hits:13
#!/usr/bin/python #[*] Bug : BulletProof FTP Client 2009 (.bps) Buffer Overflow Exploit (SEH) #[*] Credits : Stack #[*] Tested on : Xp sp2 (fr) #[*] Exploited by : His0k4 #[*] Greetings : All friends muslims HaCkErs (DZ)...04/22/2009
Nebulas Solutions maintain Virgin Media firewall and and anti-virus infrastructureHits:8
Company takeovers are always challenging, particularly where large scaleIT systems and processes need to be integrated. NTL s acquisition of Telewest and subsequent creation of Virgin Media was no exception. Virgin Media is the...04/22/2009
Comodo Endpoint Security Manager protects enterprise data with default-deny protectionHits:12
Computers are exposed to malicious software if a computer user opens an infected email, or reads from an infected thumb drive or disk. With industry-standard default-allow protection, malicious software such as viruses, keyloggers, Trojans...04/22/2009
Juniper Networks firewalls tested and certified as interoperable with Internet Protocol Version 6Hits:9
The rapid convergence of IP-centric voice, data, video, web traffic and file-sharing applications (driven by concurrent explosions in demands for network access, new forms of social media, and systematic cyber attacks and viruses) is...04/16/2009
Improper implementation of server virtualization may leave IT networks open to attackHits:6
A recent YouGov survey commissioned by Clavister found that more than 40 per cent of IT directors and managers that have implemented server virtualization may have left their IT networks open to attack because they wrongly believed...04/16/2009
Chinese Trojans steal data from organizationsHits:8
Finjan Inc. has recently conducted a study prompted by the increased volume of attacks coming from China. The study maps how users PCs are being infected by Trojans distributed from China that then steal data from organizations and details...04/13/2009
Cyber criminals steal data from Fasthosts and force hundreds of websites to shut downHits:8
Hundreds of websites have been shut down temporarily by one of the largest web hosting companies in Britain after the personal details of customers were stolen by computer hackers. The hackers managed to access the master database of...04/13/2009
SecureSphere Web Application Firewall protects Japanese online foreign exchange trading companyHits:11
According to research, one of the fastest growing threats facing organizations in 2008 are web site code injection attacks: cross-site scripting, SQL injection, Cross Site Request Forgery, and Java...04/11/2009
Five security truths to protect your critical systemsHits:6
Anyone who tells you that your IT network is 100% secure is either a fool, or greatly mistaken. Security is a moving target, and unfortunately, this target is being manipulated by the bad guys. With 2007 almost behind us, I reflect...04/11/2009
Comodo Internet Security denies access to all software that is not on the Comodo whitelistHits:14
Comodo Internet Security comprises Comodo's proprietary firewall and antivirus software. Comodo Internet Security puts power in the hands of the people with a default deny approach to installing software. The suite includes both firewall...04/09/2009
Integralis secures NHS Blood and Transplant laptop and desktop PCs against data loss and theftHits:11
NHS Blood and Transplant collects, processes, stores and issues 2.1 million blood donations per year from its 15 blood centres in England and north Wales, as well as managing the sourcing of organs for transplantation across the UK...04/09/2009
Firewall administrators are masochistsHits:12
You arrive at work for another normal day only to discover that more vulnerabilities have been reported over night, several departments are asking for access to new services and it is the firewall administration teams responsibility to...04/07/2009
Proactive Security for Enterprises with EngateLabs Global Threat Analysis and DefenseHits:10
Engate Technology Corporation has announced EngateLabs , a global network threat analysis and defense center of highly skilled researchers, analysts and advanced network profiling technology that protects organizations from botnet, phish...04/07/2009
Tufin Technologies' channel partner program grows rapidly to over fifty security-focused channel parHits:10
Tufin Technologies has announced its channel partner program has grown to over fifty leading, security-focused channel partners in its first six months. The rapid adoption of Tufin s SecureTrack solution by the channel reflects...04/02/2009

Home  <<Prev  1   2   3   4   5   6   7   8   9   10   11  Next>>  Last

Current Page:4 , Total 13 Pages, Every Page 25 Records, Total Records: 322

Hot Articles
Recommend Articles
New Articles
Sub category