Your are here:hacking technology > firewall > Article list

Home > firewall > Page 8
dns Managed Security Information and Event Monitoring service to adhere to regulations and standardsHits:9
With regulations such as PCI, Memo 22, Sarbanes-Oxley and ISO27001 increasingly demanding effective security monitoring of organisations' IT infrastructures, security managers are finding that they simply do not have the time...12/02/2008
Worthing Borough Council overhauls connectivity and firewall infrastructureHits:8
Worthing Borough Council is strengthening business continuity and security related to online public services as part of an overhaul of its connectivity and firewall infrastructure. The council has brought in CI-Net, in a three year...12/02/2008
Hackers use top news stories from Google Trends Labs to increase their fake blogs rankingsHits:10
A new technique is being used by hackers to lure PC users to fake blog sites containing malware. For the first time, hackers are capitalising on the top news stories from Google Trends Labs, which lists the day s most frequently searched...12/02/2008
Firewall test: From basic to familiarity (chart)Hits:18
Firewall test: From basic to familiarity (chart)Although the recent years has started integrated and so on unification threat management safety equipment, but the firewall was still one of many unit's basic safety equipment, that your firewall to be whether impregnable? This article...12/02/2008
Resists hacker's invasion to further know the firewall technologyHits:16
Not only the network security displays in the network viral prevention aspect, moreover also displays ability aspect which invades in the system resistance external illegal hacker. Regarding the network virus, we may through kill the...11/10/2008
Resists the network attack with the Linux system firewall functionHits:9
The hypothesized main engine service provider will possibly come under the hacker attack in the operation process, the common forms of defensive action will have SYN, DDOS and so on. Through replaces IP, searches the stand which attacks is...11/10/2008
Takes 0% resources HOST document making miniature firewall (figure)Hits:11
Takes 0% resources HOST document making miniature firewall (figure)Many net friends fill puzzled to the HOST document, because big pile of technical term lets us have a dizzy spell, how feels helpless following slightly arranges aims at HOST shield evil intention website this function to explain in detail...11/07/2008
Teaches you to use the ARP firewall to look up kills the ARP virus defensive measureHits:13
Now many school's campus nets present the line, the IP conflict, the big area to break conditions frequently and so on net, these question's root is the ARP deceit attack result. Before not having ARP deceives, the data flows is: Gateway...11/07/2008
Resists hacker's invasion to further know the firewall technologyHits:9
Not only the network security displays in the network viral prevention aspect, moreover also displays ability aspect which invades in the system resistance external illegal hacker. Regarding the network virus, we may through kill the...11/03/2008
Explains the specialized level anti-DDOS firewall - ice shieldHits:270
Ices the shield anti-DDOS firewall (Bingdun Anti-DDOS Firewall) from the IT technology world first-class US Silicon Valley, by Chinese people foreign student Mr.Bingle Wang and Mr.Buick the Zhang design development,...11/03/2008
Acts as circumstances permit to dispose three kind of firewall plansHits:13
Acts as circumstances permit to dispose three kind of firewall plansThe 21st century was the network economical time, Internet already entered everyone, when we had a good swim heartily when Internet, often cast behind the network security problem. Actually the danger is ubiquitous, the firewall is a...10/30/2008
Tells inquisition Win which you did not know the XP firewallHits:10
Tells inquisition Win which you did not know the XP firewallThe trust now everybody to Windows firewall this name is not very strange, but many Windows users can choose this firewall procedure closure, uses the third party firewall. Is actually the Windows firewall is not easy to use because of...10/30/2008
Imperva WAM automates the discovery of application vulnerabilities in production systemsHits:11
Imperva has announced that its SecureSphere Web Application Firewall now supports comprehensive Web Activity Monitoring (WAM) to automate the discovery and accelerate the remediation of application vulnerabilities in production systems. In...10/28/2008
Strong increase in the number of ZBot-D Trojan infectionsHits:9
MicroWorld has reported an alarming increase in the number of infections caused by the ZBot-D Trojan. The ZBot-D Trojan also known as ZBot, first surfaced in February, 2008 and mostly spreads via emails. It can effortlessly disable the...10/28/2008
Denbighshire County Council reduces the complexity of managing its security infrastructure with EvenHits:9
Denbighshire County Council's network supports Internet access for all employees, all schools within the county, as well as Internet access from local libraries. This means close control over IT security is vital to protect against threats...10/28/2008
SkyRecon Systems Obtains OESISOK™ CertificationHits:11
SkyRecon Systemshas announced that its StormShield v5.01 has been OESISOK certified. OESISOK certification ensures that StormShield will interoperate seamlessly with products powered by the OESIS Framework, an...10/28/2008
Secure Computing acquires provider of identity-based monitoring solutions SecurifyHits:9
Secure Computing Corporation has announced it has signed a definitive agreement to acquire Securify, a provider of identity-based monitoring solutions, for approximately 15 million plus an earn-out of up to 5 million. The purchase price i...10/28/2008
Spammers also go on holidaysHits:11
VASCO Data Security International, Inc. has announced the results of its aXs Guard Gatekeeper Internet Threat Survey. VASCO surveyed 400 small and medium sized enterprises with 5 to 250 internet users during the month of July 2008,...10/28/2008
One kind of new penetration firewall's data transmission technologyHits:14
In the goal main engine imposition back door, needs the data transmission, the data to be very simultaneously important, the movement cannot be too big. (Why won't other situations serious recommend use this technology behind I to talk...10/28/2008
Association firewall electric power two subsystem solutionHits:9
Present situation analysis   Dispatches two subsystems to involve electrical network's closed-loop control directly, relates electrical network's security, the steady operation. In recent years along with the computer and the...10/28/2008
Network security which is the lighter and which is the heavier router VS firewallHits:6
Network security which is the lighter and which is the heavier router VS firewallNow in enterprise network's safety precaution measure, the hardware level's firewall as well as from the router end implementation protection is the most main way. However also therefore, many enterprise users in puzzled: The router is the...10/27/2008
Outside the distributional firewall subordinate robs the thief within family together againstHits:5
Outside the distributional firewall subordinate robs the thief within family together againstThe distributional firewall is not a new thing, is one kind of main engine presence-like safety system, with protects in the enterprise network the key event server, the data and the workstation is exempt from the illegal...10/27/2008
How to establish the firewall to realize is forbid QQ, MSN and so onHits:21
In now requests to forbid the net user to use QQ, the association audiences and so on to chat with the net tours the software the demand to increase gradually, some time ago post-sale engineer had processed this kind of service. Engineer...10/24/2008
Next generation firewall decisive battle between performance and efficiencyHits:7
present's firewall performance unsatisfactory place have been too many, young Wang complains, lets an I most unsatisfied spot is the firewall system resources consumption is too big.   Young Wang makes network management many years...10/24/2008
Teach you how to make the floppy disk version of the Linux firewall systemHits:17
Under the Linux firewall (firewall) from birth to the present, the main firewall has gone through four stages of development: Phase I: router-based firewalls; the second phase of the user's firewall tool kit; the third phase: the...10/22/2008

Home  <<Prev  3   4   5   6   7   8   9   10   11   12   13  Next>>  Last

Current Page:8 , Total 13 Pages, Every Page 25 Records, Total Records: 322

Hot Articles
Recommend Articles
New Articles
Sub category