Please turn on your JavaScript for this page to function normally.
Key Iterations and Cryptographic Salts

The following document discusses the use of key iterations and cryptographic salts to stop dictionary attacks in password based encryption (symmetric cryptography). One of the …

AVIEN Reaction on Computer Viruses University Course

Members of the Anti-Virus Information Exchange Network (AVIEN) and the Anti- Virus Information & Early Warning System (AVIEWS) reacted with dismay today when they were …

Airscanner Mobile AntiVirus Pro Worldwide Product Launch

AIRSCANNER CORPORATION, the technological leader in wireless security software, today demonstrated its new virus scanner for the Pocket PC during a worldwide debut at the …

Secure Operating Environment for Server-based Computing

New version of SafeGuard Advanced Security enhances security in Terminal Server and Citrix environments Oberursel, May 26, 2003 – The new version 4.1 of Utimaco …

NetScreen and Trend Micro to Deliver Tighter Integration of Network Security Solutions

Expanding Alliance Aims to Deliver Industry’s First Best-of-breed Antivirus, Firewall, VPN and Intrusion Prevention Appliance MARBELLA, Spain May 23, 2003 – …

NetScreen Announces New Appliance for Enterprise Remote Sites and Telecommuters

GUILDFORD, U.K., May 23, 2003 — NetScreen Technologies, Inc. (Nasdaq: NSCN), has announced the addition of a new low-end appliance, the NetScreen-5GT, to its line of …

The Windows XP/2000 Answer Book: A Complete Resource from the Desktop to the Enterprise

The examples in this book are organized very well for easy access. This is a perfect reference guide both for system administrators and home users that want to solve problems …

Weeky Virus Report – Palyh, Petik, Melare and Redisto Worms

This week’s report looks at four worms: Palyh (W32/Palyh or Sobig.B), Petik.N (VBS/Petik.N), Melare (W32/Melare) and Redisto (W32/Redisto). Palyh (also known as Sobig.B) …

Tumbleweed Releases Anti-Spam Service Built for Business

Initial Customers Report High Spam Capture Rates And Low False Positives While Preserving Legitimate Business Communications Redwood City, CA – MAY 22, 2003 – …

Trojan Uses Internet Explorer “Exploit.SelfExecHtml” Vulnerability

Kaspersky Labs, an international data security software developer, reports the appearance of the Trojan program, ‘StartPage’ – the first malware to infect …

Royal College of General Practitioners Chooses Trustix Linux Solutions to Help Keep GPs Informed

London, UK – 22nd May 2003 – The Royal College of General Practitioners (RCGP) has chosen Trustix and IBM to supply a Linux based e-mail server solution to support …

Palyh Worm Problems Could Easily Have Been Avoided

One frequently ignored aspect of corporate antivirus protection is the built-in file filtering facilities that such protection normally includes, and which represents a …

Don't miss

Cybersecurity news