Help Net Security
Rainbow’s iKey USB Token Integrated Into Web-based Secure E-mail S-Mail.com
Dublin, Ireland, July 7th, 2003 – Network Research Lab Ltd. (NR Lab), a new provider of encrypted e-mail, today announced that the iKey USB token technology of Rainbow …
Intrusion Inc. Software-Appliance CD Turns Standard Server Platform into IDS Appliance
RICHARDSON, Texas–(BUSINESS WIRE)–July 7, 2003–Intrusion Inc. (Nasdaq:INTZ) Intrusion SecureNet Software-Appliance CD turns select Dell(TM) servers and …
StarForce Technology and OEM Allied to Protect European CD-Rs
Moscow, June 06. StarForce Technologies, a leading developer in copy protection technology announced a long-term business relationship in copy protection with O.E.M. GmbH. …
The Complete C++ Training Course 4/e
This course could just be the right one to show that object orientation is the most efficient approach to solving software engineering problems. In this sense, it's an …
Weekly Virus Report – Klexe, Scorvan and MyLife.M Worms
This report will focus on three worms: Klexe, Scorvan and MyLife.M. The effects of Klexe are dangerous, as it drops a Trojan that captures confidential information from the …
Virus Writers Strictly PC – Macs Largely Snubbed By Cyber Underworld
A report published by Sophos, a world leader in anti-virus protection for businesses, reveals that the vast majority of viruses are ignoring owners of Macintosh computers and …
Best of British Wins Network Management Product of the Year
PC-Duo Enterprise beats the competition at Networking Industry Awards for its unique approach to desktop management Tamworth, Staffordshire, UK – 3rd July 2003 – …
Securing Business Information: Strategies to Protect the Enterprise and Its Network
This book is published as a part of the IT Best Practices Series, and it is focused on the information technology in dynamic business environment. This book is a "step by …
CyberGuard To Begin Trading On Nasdaq National Market
Ft. Lauderdale, Florida – July 2, 2003 – CyberGuard Corporation (AMEX: CFW), the technology leader in network security, today announced that The NASDAQ Stock …
ActivCard Announces Extension of Follow-on Tender Offer Period for Exchange of ActivCard S.A. Securities
FREMONT, Calif., and SURESNES, France, July 3 /PRNewswire-FirstCall/ — ActivCard Corp. (Nasdaq: ACTI; Nasdaq Europe: ACTI) today announced that it is extending its …
Exploitation of data streams authorized by a network access control system for arbitrary data transfers: tunneling and covert channels over the HTTP protocol
This paper presents various concepts to researchers and NACS administrators to explain that each time an administrator thinks he only allows the HTTP protocol to get in and …
Core Security Technologies Publishes Key Vulnerabilities in Essential Components of Microsoft Software
Flaws in Active Directory and NetMeeting Allow Unauthorized Party to Crash and Potentially Take Control of User’s Systems BOSTON, MA: July 2, 2003 – Core Security …
Featured news
Resources
Don't miss
- CISA: Use Signal or other secure communications app
- Another NetWalker affiliate sentenced to 20 years in prison
- Why cybersecurity is critical to energy modernization
- Cryptocurrency hackers stole $2.2 billion from platforms in 2024
- CISA orders federal agencies to secure their Microsoft cloud environments